SlideShare a Scribd company logo
1 of 25
FOG COMPUTING
PRESENTED BY
TALHA AHMED(02-131222-130)
JAWAD AHMED(02-131222-094)
HASSAN GUL RAO(02-131222-114)
WHAT IS FOG
COMPUTING?
Fog computing is defined as a
decentralized infrastructure that places
storage and processing components at
the edge of the cloud, where data
sources such as application users and
sensors exist.
It is an architecture that uses edge
devices to carry out a substantial
amount of computation (edge
computing), storage, and
communication locally and routed over
the Internet backbone.
To achieve real-time automation, data capture and
analysis has to be done in real-time without having to
deal with the high latency and low bandwidth issues
that occur during the processing of network data In
2012, Cisco introduced the term fog computing for
dispersed cloud infrastructures.. In 2015, Cisco partnered
with Microsoft, Dell, Intel, Arm and Princeton University
to form the OpenFog Consortium.
OVERVIEW OF FOG COMPUTING
Other organizations, including General Electric (GE),
Foxconn and Hitachi, also contributed to this consortium.
The consortium's primary goals were to both promote
and standardize fog computing. These concepts brought
computing resources closer to data sources and allowed
these assets to access actionable intelligence using the
data they produced without having to communicate with
distant computing infrastructure.
CLOUD COMPUTING (EXISTING SYSTEM)
Cloud is a cluster of multiple dedicated
servers attached within a network. It
provides many computing services to
their customers. Currently “pay-as-you-
use “ cloud computing became an
efficient alternative to owing and
managing private data centers for
customers using web applications.
Like Cloud, Fog Provides Data
Computation , Storage And Application
Services For End users. Fog Computing
Concept Is Actually A Cloud Computing
Close To Ground.
WHY DO WE NEED FOG COMPUTING?
With the proliferation of cloud computing
placing added demands on internet speed and
connectivity. Latency is becoming a more critical
concern for everyone, from the end user to the
enterprise.
Another prominent limitation of cloud
computing includes requirement of high speed
reliable internet connectivity and sometimes
multi-homing to avoid link outages and high
latency, but would be very expensive and
complex . the way the IOT is growing, it needs
a special infrastructure base that can handle
all its requirements. At present, fog computing
is on a surge and it seems to be the most
feasible option available
CLOUD ARCHITECTURE BEFORE THE ADVENT OF FOG COMPUTING
CLOUD ARCHITECTURE AFTER THE ADVENT OF FOG COMPUTING
END DEVICES FOG NODES
MONITORING
SERVICES
DATA
PROCESSORS
RESOURCE
MANAGER
SECURITY
TOOLS
APPLICATIONS BASIC COMPONENTS
OF FOG COMPUTING
The devices that people are most
familiar with are known as end
devices . It is the source or
destination device in a network
system . For example computers,
mobile phones, routers, cameras,
smart watches, or sensors are
data generators and can cover a
large spectrum of technology.
END DEVICES
FOG NODES
Fog nodes are independent devices that
pick up the generated information. Fog
nodes fall under three categories: fog
devices, fog servers, and gateways. These
devices store necessary data while fog
servers also compute this data to decide
the course of action. Fog devices are
usually linked to fog servers. Fog
gateways redirect the information
between the various fog devices and
servers.
MONITORING SERVICES
Monitoring services usually
include application
programming interfaces (APIs)
that keep track of the system’s
performance and resource
availability. Monitoring systems
ensure that all end devices and
fog nodes are up and
communication isn’t stalled.
DATA PROCESSORS
Data processors are programs that run
on fog nodes. They filter, trim, Encript
and sometimes even reconstruct faulty
data that flows from end devices. Data
processors are in charge of deciding
what to do with the data — whether it
should be stored locally on a fog server
or sent for long-term storage in the
cloud. Some processors are intelligent
enough to fill the information based
on historical data if one or more
sensors fail. This prevents any kind of
application failure.
RECOURCE MANAGER
Fog computing consists of
independent nodes that must work
in a synchronized manner. The
resource manager allocates and
deallocates resources to various
nodes and schedules data transfer
between nodes and the cloud. It also
takes care of data backup, ensuring
zero data loss. The resource
manager works with the monitor to
determine when and where the
demand is high. This ensures that
there is no redundancy of data as
well as fog servers.
SECURITY TOOLS
Since fog components directly
interact with raw data sources,
security must be built into the
system even at the ground
level. Encryption is must since all
communication tends to happen
over wireless networks. End users
directly ask the fog nodes for data
in some cases. As such, user and
access management is part of the
security efforts in fog computing.
APPLICATIONS
The applications can store confidential
data in various networks and monitor
this data rather than keeping a
physical copy. Applications provide
actual services to end-users. They use
the data provided by the fog
computing system to provide quality
service while ensuring cost-
effectiveness.
FOG COMPUTING AND EDGE COMPUTING
Edge computing and fog computing can both be defined as
technological platforms that bring computing processes
closer to where data is generated and collected from. Edge
computing can lead to large volumes of data being
transferred directly to the cloud. This can affect system
capacity, efficiency, and security. Fog computing addresses
this problem by inserting a processing layer between the
edge and the cloud. This way, the ‘fog computer’ receives the
data gathered at the edge and processes it before it reaches
the cloud.
Edge computing is defined as the practice of processing
and computing client data closer to the data source rather
than on a centralized server or a cloud-based location.
Fog computing also differentiates
between relevant and irrelevant data.
While relevant data is sent to
the cloud for storage, irrelevant data
is either deleted or transmitted to the
appropriate local platform. As such,
edge computing and fog computing
work in unison to minimize latency
and maximize the efficiency
associated with cloud-enabled
enterprise systems.
FOG COMPUTING CAN SOLVE THE IOT
CHALLENGES
02 03
NETWORK
BANDWIDTH
CONSTRAINTS
UNINTERUPTED
SERVICES
01
IOT SECURITY
CHALLENGES
04
IOT
APPLICATIONS
With Fog computing, local data
storage and scrutiny of time-
sensitive data become easier.
With this the amount and the
distance of passing data to the
cloud is reduced, therefore
reducing the security
challenges..
Fog computing enables data
processing based on application
demands, available networking and
computing resources. This reduces the
amount of data required to be
transferred to the cloud, ultimately
saving network bandwidth.
Fog computing can run independently
and ensure uninterrupted services
even with fluctuating network
connectivity to the cloud. It performs
all time-sensitive actions close to end
users which meets latency constraints
of IoT applications.
NETWORK BANDWIDTH
CONSTRAINTS
UNINTRUPTED SERVICES
IOT SECURITY CHALLENGES
IoT applications where data is generated in
terabytes or more, where a quick and large
amount of data processing is required and
sending data to the cloud back and forth is
not feasible, are good candidates for fog
computing. There are several IoT
applications where fog computing can play
a vital role. Some of them are:
2) HELATHCARE ACTIVITY TRACKING
1) SMART HOMES
IoT APPLICATIONS:
The smart home consists of various
devices and sensors connected.
However, these devices have
different platforms making it
difficult to integrate. Fog
computing provides a unified
interface to integrate all different
independent devices and empowers
smart home applications with
flexible resources to enable
storage, real-time processing and
low latency.
Fog computing provides real-time
processing and event responses
which are critical in healthcare.
Besides, it also addresses issues
regarding network connectivity and
traffic required for remote storage,
processing and medical record
retrieval from the cloud.
01 02
SMART HOMES HEALTHCARE ACTIVITY
TRACKING
22
Its physical location takes
away any where, any time
data service of the cloud
Privacy Issues
Availability and cost of fog
equipment
Trust and Authentication
concerns
Security Issues: IP
Address Spoofing ,Man
in the middle attacks
Reduces the amount of
data sent to cloud.
Improves systems
response time
Supports Mobility
Minimizes Network and
Internet latency
Conserves Network
Bandwidth
Pros Cons
SECURITY ISSUES IN FOG COMPUTING:
Fog computing security issues
arise as there are many devices
connected to fog nodes and at
different gateways. Each device
has a different IP address, and
any hacker can fake your IP
address to gain access to your
personal information that is
stored in that particular fog node.
The main security concerns are
data protection, privacy issues,
Intrusion Detection etc.
MAN-IN-THE-MIDDLE ATTACK
We can take man in the middle
attack as an example to expose
security issues in fog computing. In
this attack, gateways serving as fog
nodes may be compromised or
replaced by fake ones. The goal of an
attack is to steal personal
information, such as login
credentials, account details and credit
card numbers
Thankyou.

More Related Content

Similar to Fog comuting

Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Fog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialFog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialHarshitParkar6677
 

Similar to Fog comuting (20)

Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog computing
Fog computingFog computing
Fog computing
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Fog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its PotentialFog Computing: Helping the Internet of Things Realize its Potential
Fog Computing: Helping the Internet of Things Realize its Potential
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Fog comuting

  • 1. FOG COMPUTING PRESENTED BY TALHA AHMED(02-131222-130) JAWAD AHMED(02-131222-094) HASSAN GUL RAO(02-131222-114)
  • 2. WHAT IS FOG COMPUTING? Fog computing is defined as a decentralized infrastructure that places storage and processing components at the edge of the cloud, where data sources such as application users and sensors exist. It is an architecture that uses edge devices to carry out a substantial amount of computation (edge computing), storage, and communication locally and routed over the Internet backbone.
  • 3. To achieve real-time automation, data capture and analysis has to be done in real-time without having to deal with the high latency and low bandwidth issues that occur during the processing of network data In 2012, Cisco introduced the term fog computing for dispersed cloud infrastructures.. In 2015, Cisco partnered with Microsoft, Dell, Intel, Arm and Princeton University to form the OpenFog Consortium. OVERVIEW OF FOG COMPUTING Other organizations, including General Electric (GE), Foxconn and Hitachi, also contributed to this consortium. The consortium's primary goals were to both promote and standardize fog computing. These concepts brought computing resources closer to data sources and allowed these assets to access actionable intelligence using the data they produced without having to communicate with distant computing infrastructure.
  • 4. CLOUD COMPUTING (EXISTING SYSTEM) Cloud is a cluster of multiple dedicated servers attached within a network. It provides many computing services to their customers. Currently “pay-as-you- use “ cloud computing became an efficient alternative to owing and managing private data centers for customers using web applications. Like Cloud, Fog Provides Data Computation , Storage And Application Services For End users. Fog Computing Concept Is Actually A Cloud Computing Close To Ground.
  • 5. WHY DO WE NEED FOG COMPUTING? With the proliferation of cloud computing placing added demands on internet speed and connectivity. Latency is becoming a more critical concern for everyone, from the end user to the enterprise. Another prominent limitation of cloud computing includes requirement of high speed reliable internet connectivity and sometimes multi-homing to avoid link outages and high latency, but would be very expensive and complex . the way the IOT is growing, it needs a special infrastructure base that can handle all its requirements. At present, fog computing is on a surge and it seems to be the most feasible option available
  • 6. CLOUD ARCHITECTURE BEFORE THE ADVENT OF FOG COMPUTING
  • 7. CLOUD ARCHITECTURE AFTER THE ADVENT OF FOG COMPUTING
  • 8. END DEVICES FOG NODES MONITORING SERVICES DATA PROCESSORS RESOURCE MANAGER SECURITY TOOLS APPLICATIONS BASIC COMPONENTS OF FOG COMPUTING
  • 9. The devices that people are most familiar with are known as end devices . It is the source or destination device in a network system . For example computers, mobile phones, routers, cameras, smart watches, or sensors are data generators and can cover a large spectrum of technology. END DEVICES
  • 10. FOG NODES Fog nodes are independent devices that pick up the generated information. Fog nodes fall under three categories: fog devices, fog servers, and gateways. These devices store necessary data while fog servers also compute this data to decide the course of action. Fog devices are usually linked to fog servers. Fog gateways redirect the information between the various fog devices and servers.
  • 11. MONITORING SERVICES Monitoring services usually include application programming interfaces (APIs) that keep track of the system’s performance and resource availability. Monitoring systems ensure that all end devices and fog nodes are up and communication isn’t stalled.
  • 12. DATA PROCESSORS Data processors are programs that run on fog nodes. They filter, trim, Encript and sometimes even reconstruct faulty data that flows from end devices. Data processors are in charge of deciding what to do with the data — whether it should be stored locally on a fog server or sent for long-term storage in the cloud. Some processors are intelligent enough to fill the information based on historical data if one or more sensors fail. This prevents any kind of application failure.
  • 13. RECOURCE MANAGER Fog computing consists of independent nodes that must work in a synchronized manner. The resource manager allocates and deallocates resources to various nodes and schedules data transfer between nodes and the cloud. It also takes care of data backup, ensuring zero data loss. The resource manager works with the monitor to determine when and where the demand is high. This ensures that there is no redundancy of data as well as fog servers.
  • 14. SECURITY TOOLS Since fog components directly interact with raw data sources, security must be built into the system even at the ground level. Encryption is must since all communication tends to happen over wireless networks. End users directly ask the fog nodes for data in some cases. As such, user and access management is part of the security efforts in fog computing.
  • 15. APPLICATIONS The applications can store confidential data in various networks and monitor this data rather than keeping a physical copy. Applications provide actual services to end-users. They use the data provided by the fog computing system to provide quality service while ensuring cost- effectiveness.
  • 16. FOG COMPUTING AND EDGE COMPUTING Edge computing and fog computing can both be defined as technological platforms that bring computing processes closer to where data is generated and collected from. Edge computing can lead to large volumes of data being transferred directly to the cloud. This can affect system capacity, efficiency, and security. Fog computing addresses this problem by inserting a processing layer between the edge and the cloud. This way, the ‘fog computer’ receives the data gathered at the edge and processes it before it reaches the cloud. Edge computing is defined as the practice of processing and computing client data closer to the data source rather than on a centralized server or a cloud-based location.
  • 17. Fog computing also differentiates between relevant and irrelevant data. While relevant data is sent to the cloud for storage, irrelevant data is either deleted or transmitted to the appropriate local platform. As such, edge computing and fog computing work in unison to minimize latency and maximize the efficiency associated with cloud-enabled enterprise systems.
  • 18. FOG COMPUTING CAN SOLVE THE IOT CHALLENGES 02 03 NETWORK BANDWIDTH CONSTRAINTS UNINTERUPTED SERVICES 01 IOT SECURITY CHALLENGES 04 IOT APPLICATIONS
  • 19. With Fog computing, local data storage and scrutiny of time- sensitive data become easier. With this the amount and the distance of passing data to the cloud is reduced, therefore reducing the security challenges.. Fog computing enables data processing based on application demands, available networking and computing resources. This reduces the amount of data required to be transferred to the cloud, ultimately saving network bandwidth. Fog computing can run independently and ensure uninterrupted services even with fluctuating network connectivity to the cloud. It performs all time-sensitive actions close to end users which meets latency constraints of IoT applications. NETWORK BANDWIDTH CONSTRAINTS UNINTRUPTED SERVICES IOT SECURITY CHALLENGES
  • 20. IoT applications where data is generated in terabytes or more, where a quick and large amount of data processing is required and sending data to the cloud back and forth is not feasible, are good candidates for fog computing. There are several IoT applications where fog computing can play a vital role. Some of them are: 2) HELATHCARE ACTIVITY TRACKING 1) SMART HOMES IoT APPLICATIONS:
  • 21. The smart home consists of various devices and sensors connected. However, these devices have different platforms making it difficult to integrate. Fog computing provides a unified interface to integrate all different independent devices and empowers smart home applications with flexible resources to enable storage, real-time processing and low latency. Fog computing provides real-time processing and event responses which are critical in healthcare. Besides, it also addresses issues regarding network connectivity and traffic required for remote storage, processing and medical record retrieval from the cloud. 01 02 SMART HOMES HEALTHCARE ACTIVITY TRACKING
  • 22. 22 Its physical location takes away any where, any time data service of the cloud Privacy Issues Availability and cost of fog equipment Trust and Authentication concerns Security Issues: IP Address Spoofing ,Man in the middle attacks Reduces the amount of data sent to cloud. Improves systems response time Supports Mobility Minimizes Network and Internet latency Conserves Network Bandwidth Pros Cons
  • 23. SECURITY ISSUES IN FOG COMPUTING: Fog computing security issues arise as there are many devices connected to fog nodes and at different gateways. Each device has a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog node. The main security concerns are data protection, privacy issues, Intrusion Detection etc.
  • 24. MAN-IN-THE-MIDDLE ATTACK We can take man in the middle attack as an example to expose security issues in fog computing. In this attack, gateways serving as fog nodes may be compromised or replaced by fake ones. The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers

Editor's Notes

  1. Photo by Nastuh Abootalebi on Unsplash
  2. Photo by Copernico on Unsplash
  3. Photo by Nastuh Abootalebi on Unsplash
  4. Photo by airfocus on Unsplash
  5. Photo by Christian Perner on Unsplash
  6. Photo by Christian Perner on Unsplash
  7. Photo by Dylan Gillis on Unsplash
  8. Photo by nrd on Unsplash
  9. Photo by Nastuh Abootalebi on Unsplash