SlideShare a Scribd company logo
1 of 34
Master of Computer Applications
(Semester III )
FACULTY OF SCIENCE
CS-501 - Technical Writing
A platform for IoT And Cloud
CONTENTS…
Introduction to Fog .
Limitations of cloud.
6 dimensions of fog.
Fog Overcomes Cloud.
Key Pillars Of Fog Computing.
Fog Computing v/s Cloud Computing.
Open Fog Consortium.
3-Tier Architecture Of Fog.
Service Based Working Of Fog.
Security Issues.
Applications.
Future Challenges.
Conclusions.
INTRODUCTION TO FOG
It is a technology in
which data, processing
and applications are
concentrated in devices at
the network edge rather
than existing almost
entirely in the cloud.
The term “fogging” was
introduced by CISCO in
2012.
SITUATION BEFORE FOG
Due to increasing number of connected IoT devices, the cloud traffic is
increasing which has posed several challenges and result in the following
limitations of cloud-
NETWORK CONGESTION
Security Issues With Cloud
Fog Overcomes Cloud
• Reduction in data movement across the network
resulting in reduced congestion.
• Elimination of bottlenecks resulting from centralized
computing systems.
• Improved security of encrypted data as it stays closer
to the end user.
KEY PILLARS OF FOG COMPUTING
• Scalability
-Virtualization
-Hierarchy of nodes
-Modularity
• Security
-Strong Security
-Fault Tolerance
• Programmability
-Interoperability
-Multiple Application Support
• Real-Time Features
-Deterministic timing capability
Requirement
Latency
Delay Jitter
Location of server nodes
Distance between cloud and
server
Security
Attack on routers
Geographical Distribution
No. of server nodes
Support for mobility
Real time interaction
Cloud
computing
High
High
Within internet
Multiple hops
Undefined
High Probability
Centralized
Few
Limited
Supported
Fog
computing
Low
Very low
At the edge of local network
One hop
Can be defined
Very Less Probability
Distributed
Very large
Distributes
Distributed
Fog is managed by a consortium
named OPENFOG
The OpenFog Consortium is a consortium of high tech industry
companies and academic institutions across the world aimed at the
standardization and promotion of fog computing in various
capacities and fields.
3 Tier Architecture Of Fog
Categorization
Of Data
Extremely Time
Sensitive Data
Less time
Sensitive Data
Non Time-
Sensitive Data
Non time
sensitive
data
Sends the summary for historical analysis
and storage
Action
Sends the
summary for
historical
analysis and
storage
cloud
Nearest
fog
node
Devices Aggregate
fog node
ADVANCED ENCRYPTION
ALGOITHM
• Most advanced and secured standard for encryption of electronic
data.
• AES accepts of the key size of 128, 192, 256 bits of size.
• Fast in both software as well as hardware .
FOG SIMULATION TOOLS
• iCanCloud
• OPNET
• Cloud Analyst
• iFogSim
• Network Cloud
• Network
Simulator 2
(NS2)
• OMNeT++
Connected Vehicles
Real-time interactions
will make
communications
between cars, access
points and traffic
lights as safe and
efficient as possible.
At some point in time,
the connected car will
start saving lives.
Fog computing will be
the best option for all
internet connected
vehicles.
Fire Detection and Fighting
It monitors
geographic areas.
The monitoring is
done through the
gathering of
information such as
wind speed,
moisture, and
temperature. When
fire is detected, the
application evaluates
its intensity and
contour and
dispatches the most
appropriate robots to
extinguish it.
Real Time Health Analytics
Patient with
chronic illness
can be treated in
real time.
During emergency
respective doctors
will be alerted.
Historical data
analytics can
predict future
changes of the
patient.
Smart Cities
Fog computing
allows fast,
machine-to-
machine (M2M)
handshakes and
human to
machine
interactions
(HMI), which
would work in
cooperation with
the cloud.
TECH GIANTS WORKING ON FOG
CONCLUSIONS
 Fog computing is not a substitute for cloud
computing but a powerful complement.
It solves primary problem faced by cloud while
handling IoT data.
It’s benefits extend from an individual person to
huge firms.
Provides real time analytics and monitoring.
The Future Of IoT Lies
In
REFERENCES
www.fogcongress.com
www.grandresearchstore.com
www.nptel.com
www.fogcomputingexpo.com
www.wikipedia.org
www.openfogconsortium.org
www.slideshare.net
Fog Computing Overcomes Cloud Limitations for IoT

More Related Content

What's hot

Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material ccAnkit Gupta
 
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...Simplilearn
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Simplilearn
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingCygnet Infotech
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.sindhuRashmi1
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
free space laser communication
free space laser communicationfree space laser communication
free space laser communicationBHari5
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud ComputingRajshri Mohan
 

What's hot (20)

Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
free space laser communication
free space laser communicationfree space laser communication
free space laser communication
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 

Similar to Fog Computing Overcomes Cloud Limitations for IoT

The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 

Similar to Fog Computing Overcomes Cloud Limitations for IoT (20)

The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Fog computing
Fog computingFog computing
Fog computing
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Seminar report
Seminar reportSeminar report
Seminar report
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Fog Computing Overcomes Cloud Limitations for IoT

  • 1. Master of Computer Applications (Semester III ) FACULTY OF SCIENCE CS-501 - Technical Writing
  • 2. A platform for IoT And Cloud
  • 3. CONTENTS… Introduction to Fog . Limitations of cloud. 6 dimensions of fog. Fog Overcomes Cloud. Key Pillars Of Fog Computing. Fog Computing v/s Cloud Computing. Open Fog Consortium. 3-Tier Architecture Of Fog. Service Based Working Of Fog. Security Issues. Applications. Future Challenges. Conclusions.
  • 4. INTRODUCTION TO FOG It is a technology in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. The term “fogging” was introduced by CISCO in 2012.
  • 5.
  • 7. Due to increasing number of connected IoT devices, the cloud traffic is increasing which has posed several challenges and result in the following limitations of cloud-
  • 9.
  • 11.
  • 12. Fog Overcomes Cloud • Reduction in data movement across the network resulting in reduced congestion. • Elimination of bottlenecks resulting from centralized computing systems. • Improved security of encrypted data as it stays closer to the end user.
  • 13. KEY PILLARS OF FOG COMPUTING • Scalability -Virtualization -Hierarchy of nodes -Modularity • Security -Strong Security -Fault Tolerance • Programmability -Interoperability -Multiple Application Support • Real-Time Features -Deterministic timing capability
  • 14.
  • 15. Requirement Latency Delay Jitter Location of server nodes Distance between cloud and server Security Attack on routers Geographical Distribution No. of server nodes Support for mobility Real time interaction Cloud computing High High Within internet Multiple hops Undefined High Probability Centralized Few Limited Supported Fog computing Low Very low At the edge of local network One hop Can be defined Very Less Probability Distributed Very large Distributes Distributed
  • 16. Fog is managed by a consortium named OPENFOG The OpenFog Consortium is a consortium of high tech industry companies and academic institutions across the world aimed at the standardization and promotion of fog computing in various capacities and fields.
  • 18. Categorization Of Data Extremely Time Sensitive Data Less time Sensitive Data Non Time- Sensitive Data
  • 19. Non time sensitive data Sends the summary for historical analysis and storage Action Sends the summary for historical analysis and storage cloud Nearest fog node Devices Aggregate fog node
  • 20. ADVANCED ENCRYPTION ALGOITHM • Most advanced and secured standard for encryption of electronic data. • AES accepts of the key size of 128, 192, 256 bits of size. • Fast in both software as well as hardware .
  • 21.
  • 22. FOG SIMULATION TOOLS • iCanCloud • OPNET • Cloud Analyst • iFogSim • Network Cloud • Network Simulator 2 (NS2) • OMNeT++
  • 23.
  • 24. Connected Vehicles Real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible. At some point in time, the connected car will start saving lives. Fog computing will be the best option for all internet connected vehicles.
  • 25. Fire Detection and Fighting It monitors geographic areas. The monitoring is done through the gathering of information such as wind speed, moisture, and temperature. When fire is detected, the application evaluates its intensity and contour and dispatches the most appropriate robots to extinguish it.
  • 26. Real Time Health Analytics Patient with chronic illness can be treated in real time. During emergency respective doctors will be alerted. Historical data analytics can predict future changes of the patient.
  • 27. Smart Cities Fog computing allows fast, machine-to- machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud.
  • 28.
  • 30. CONCLUSIONS  Fog computing is not a substitute for cloud computing but a powerful complement. It solves primary problem faced by cloud while handling IoT data. It’s benefits extend from an individual person to huge firms. Provides real time analytics and monitoring.
  • 31. The Future Of IoT Lies In
  • 32.

Editor's Notes

  1. Fog computing also is often erroneously called edge computing, but there are key differences. Fog works with the cloud, whereas edge is defined by the exclusion of cloud. Fog is hierarchical, where edge tends to be limited to a small number of layers. In additional to computation, fog also addresses networking, storage, control and acceleration
  2. Managed by OpenFog Reference Architecture (OpenFog RA)
  3. The number of devices connected to internet has exceeded the world’s population in the year 2010 and at present it is double the world’s population and in the next five years from now it would be about 50 billion of devices connected to the internet.
  4. An actuator is a component of a machine that is responsible for moving or controlling a mechanism or system. An actuator requires a control signal and a source of energy. The control signal is relatively low energy and may be electric voltage or current, pneumatic or hydraulic pressure, or even human power.
  5. Security problems in Cloud. At present each of the airplane produces around 20 terabytes of data produced in an hour and they need to be stored and retrieved real time. Cisco predicts that in the next decade, Internet of Things will be at 14.4$ trillion value of stake for companies.
  6. As the number of the devices connected to the internet has been increasing at rapid speed and even advancement in the Internet of Things has led this number to increase drastically. In the future, the world would be full of sensors and there would be huge amount of data produced by these devices and storing data into cloud and retrieving is highly difficult. Hence fog has been introduced.
  7. A virtual machine monitor (VMM) or hypervisor is computer software, that generates and runs virtual machines. A hypervisor operates one or more virtual machines on a machine which is known as host machine.
  8. Jitter is the variation in data flow between two systems often caused by network congestion that causes problems with real-time communications unauthorized access will be notified to the system. There are still some problems with the existing method leading to hacking and accessing of data in fog. This motivated us to think for encryption of data in the level of fog in cloud system. Decoy system [7] is being used as current security system for authorization of data. Decoy system is said to be a system of deception in which phony components are setup for enticing of the unauthorized users by giving vulnerabilities of a system thereby restricting unauthorized access to the network.
  9. whenever user requests for the data, the encrypted data travels from cloud to fog and fog to end user and the data will be decrypted at end user.
  10. iCan Cloud: The primary aim of iCanCloud is to report the trade-off between cost and performance on a specific hardware. TOPNET’s is normally specialized for network development and research. OPNET It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber and the graphical interface is utilized to make the network topology. application and entities from the system application layer to the physical layer. Here, the object oriented programming language is utilized to generate a mapping from the graphical interface for the real implementation OPNET’s is normally specialized for network development and research. It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber. Cloud Analyst: Cloud Analyst distinguishes the simulation experimentation exercise from a programming exercise. It also enables a simulator to repeatedly do simulations and to carry out a set of simulation experiments with little parameters variations in a easy and frequent way. Cloud sim: It is significant to notice that CloudSim is not a ready-to-use solution where you adjust parameters and gather results for usage in your project. All the CloudSim components interact with each other via message passing. Network Cloud : Network Cloud is an extended version of CloudSim and is capable of enforcing network layer in CloudSim, reads a BRITE file and creates a topological network OMNET++: OMNeT++ is a public source, a discrete event modeller with GUI support of component based network modeller. The primary application field of this simulator is the communication networks along with its reliable architecture it has other areas i.e. hardware architecture, IT systems, queuing network and also in business mechanism.
  11. Connected car: Autonomous vehicle is the novel trend occurs on the road. Tesla is operating on software to add automatic steering, enabling literal "hands free" operations of the vehicle. Starting out with releasing and testing selfparking characteristics that don't need a person behind the wheel [5]. Within 2017 all new cars on the road will have the ability to link to cars nearby and internet. Fog computing will be the best choice for all internet linked vehicles why because fog computing provides real time interaction. Cars, traffic lights and access point will be able to communicate
  12. The application is made up of three components: Fire Detector, Firefighting Strategies, and Robots Dispatcher. These three components could be located in a cloud that might be geographically far from IoT devices (i.e., the sensors and the robots). This may cause transmission delays between the IoT devices and the application components. Chances to detect and fight fire in a timely manner might be compromised. Fig depicts a potential fog system approach to the problem. The Fire Detector and/or the Robot Dispatcher can be moved from the cloud stratum to the fog stratum .Moving either of both of these components to the fog stratum helps to achieve tight end-to-end latency constraint. For example, locating the Fire Detector at the fog stratum allows it to collect real-time data from the sensors and detect if there is fire . This detection can be done in a timely manner, seeing that the fog stratum is closer to the IoT devices.
  13. The cloud computing market for health care is measured to arrive $5.4 billion by 2017, according to Markets and Markets report and fogging would permit this on a more confined level.
  14. In decentralized smart building control wireless sensors are set up to evaluate humidity, temperature, or levels of several gaseous components in the building environment. Hence information can be exchanged between all sensors in the floor and the reading can be mixed to form reliable evaluations. Utilizing distributed decision building the fog devices react to data. The system prepares to work together to decrease the input fresh air, temperature and output moisture from the air or increase humidity. Sensors reply to the movements by switching off or on the lights. Observance of the outlook the fog computing are used for smart buildings which can manage basic requirements of conserving internal and external energy.
  15. Security The main security issue is the authentication of the devices involved in fog computing at different gateways. Each appliance has its own IP address. A malicious user may use a fake IP address to access information stored on the particular fog node. To overcome this access control an intrusion detection system has to be applied at all layers of the platform