SlideShare a Scribd company logo
Presented By:
P.GIRIDHAR
CONTENTS
 Abstract
 Introduction
 Existing System
 Proposed System
 Characteristics of Fog Computing
 Cloud Vs. Fog
 Scenarios
 Architecture
 Applications
 Examples of Fog Computing
 Advantages
 Disadvantages
 Future Enhancement
 Conclusion
 References
• FOG Computing is an advanced or extended version of cloud computing
where the computing takes place at the edge of the network. There are many
companies currently spending a lot of research on this topic like Cisco etc.
• It is similar to cloud computing, but is far denser in geographical distribution
and location and its proximity to end users is more, which means they provide
a faster end-user experience than cloud computing and have better
performance.
• The questions about its complexity, practical feasibility, cost and performance
are arising in different research communities. There is also a major concern
about it's reliability or durability in performing all sorts of operations
performed by cloud computing systems.
ABSTRACT
INTRODUCTION
• CISCO recently delivered the vision of Fog computing to enable applications
on billions of connected devices to run directly at the network edge.
Customers can develop, manage and run software applications on Cisco
framework of networked devices, including hardened routers and switches.
Cisco brings the open source Linux and network operating system together in
a single networked device.
• Fog computing, also known as fog networking, is a decentralized
computing infrastructure in which computing resources and application
services are distributed in the most logical, efficient place at any point along
the continuum from the data source to the cloud. The goal of fog computing is
to improve efficiency and reduce the amount of data that needs to be
transported to the cloud for data processing, analysis and storage. This is often
done for efficiency reasons, but it may also be carried out for security
and compliance reasons.
• A simple three level hierarchy as shown in above figure.
• In this framework, each smart things and intefaces is attached to one of
Fog devices. Fog devices could be interconnected and each of them is
linked to the Cloud.
Contd…
• Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-
you-go” Cloud computing model becomes an efficient alternative to
owning and managing private data centers for customers facing Web
applications
EXISTING SYSTEM
DISADVANTAGES
 Existing data protection mechanisms such as encryption was failed in securing
the data from the attackers.
 It does not verify whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the data from
unauthorized access.
• Unlike traditional data centers, Fog devices are geographically distributed over
heterogeneous platforms, spanning multiple management domains. Cisco is
interested in innovative proposals that facilitate service mobility across
platforms, and technologies that preserve end-user and content security and
privacy across domains.
PROPOSED SYSTEM
ADVANTAGES
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of-
services(Qos) and real time applications.
CHARACTERISTICS OF FOG COMPUTING
 Edge location, location awareness, and low latency : Fog computing support
endpoints with finest services at the edge of the network.
 Geographical distribution : The services and application objective of the fog is
widely distributed.
 Support for mobility : Using LISP protocol fog devices provide mobility
techniques like decouple host identity to location identity.
 Real time interactions : fog computing requires real time interactions for speedy
service.
 Heterogeneity : Fog nodes can be deployed in a wide variety of environments.
 Interoperability : Fog components must be able to interoperate in order to give
wide range of services like streaming.
CLOUD vs. FOG
Fog – Solution to Cloud’s Limitations
• Reduction in data movement across the network resulting in reduced
congestion.
• Elimination of bottlenecks resulting from centralized computing
systems.
• Improved security of encrypted data as it stays closer to the end user.
CLOUD vs. FOG
Scenarios
Smart
Grid
Internet
of Things Decentralized
smart building
control
Software
defined
networks
Smart
Traffic
Lights
Wireless
Sensor
The design of fog architecture or the key components of fog architecture are
discussed below:
• Heterogeneous Physical Resources
• Fog Abstraction Layer
• Fog Service Orchestration Layer
•Foglet Software Agent
•Distributed Database
•Policy-Based Service Orchestration
ARCHITECTURE OF FOG TECHNOLOGY
Components in Fog architecture
• Heterogeneous Physical Resources:
 Heterogeneous in nature, ranging from high-speed links connecting enterprise
data centers and the core to multiple wireless access technologies towards the
edge. 3G/4G, LTE, Wi-Fi etc.
• Fog Abstraction Layer:
 A uniform and programmable interface for seamless resource management an
d control.
 The layer provides generic APIs for monitoring, provisioning and controlling
physical resources such as CPU, memory, network and energy.
• Fog Service Orchestration Layer:
 Provides dynamic, policy-based life-cycle management of Fog services.
 Managing services on a large volume of Fog nodes with a wide range of
capabilities is achieved with the following technology and components:
 Foglet Software Agent,
 Distributed Database, persistent storage to store policies and
resource meta-data,
 Policy-Based Service Orchestration, provides policy-based
service routing, i.e., routes an incoming service request to the
appropriate service instance that confirms to the relevant business
policies.
Smart Grid:
 Fog computing allows fast, machine-to-machine (M2M) handshakes and human
to machine interactions (HMI), which would work in cooperation with the
cloud.
Decentralized Smart Building Control:
 Wireless sensors are installed to measure temperature, humidity, or levels of
various gaseous components in the building atmosphere.
 Information can be exchanged among all sensors in the floor and the reading
can be combined to form reliable measurements.
Smart Cities:
 Fog computing would be able to obtain sensor data on all levels, and integrate
all the mutually independent network entities within.
Health Care:
 The cloud computing market for healthcare is expected to reach $5.4 billion by
2017, according to a Markets and Markets report, and fog computing would
allow this on a more localized level.
• Tech giants Cisco and IBM are the driving forces behind fog
computing, and link their concept to the emerging Internet of
Things (IoT).
• Fog has a direct correlation with IoT.
• According to CISCO, the important areas where fog would
play a vital role are the following :
APPLICATIONS OF FOG
Connected cars
 Fog computing is ideal for Connected Vehicles (CV) because real-time
interactions will make communications between cars, access points and traffic
lights as safe and efficient as possible.
 At some point in time, the connected car will start saving lives by reducing
automobile accidents.
 Fog computing will be the best option for all internet connected vehicles
because fog computing gives real time interaction.
Connected Vehicles communicating each other
In this subsection, we take Man-in-the-middle attack as
an example to expose the security problems in Fog Computing. In this attack,
gateways serving as Fog devices may be comprised or replaced by fake ones.
Man-In-The-Middle Attack:
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of-
services (QoS) and real time applications.
ADVANTAGES
 Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
 It does not verify whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the data from
unauthorized access.
DISADVANTAGES
 Future work will expand on the Fog computing paradigm in Smart Grid. In
this scenario, two models for Fog devices can be developed. Independent
Fog devices consult directly with the Cloud for periodic updates on price
and demands, while interconnected Fog devices may consult each other.
 Next, Fog computing based SDN in vehicular networks will receive due
attention.
FUTURE ENCHANCEMENT
 Fog computing advantages for services in several domains, such as
Smart Grid, wireless sensor networks, Internet of Things (IoT) and
software defined networks (SDNs). We examine the state- of-the-art and
disclose some general issues in Fog computing including security,
privacy, trust, and service migration among Fog devices and between Fog
and Cloud.
CONCLUSION
References
 http://www.webopedia.com/TERM/F/fog-computing.html
 http://internetofthingsagenda.techtarget.com/definition/fog-computing-
fogging
 http://www.westbaseuk.com/news/fog-computing-vs-cloud-computing-whats-
the-difference/
 http://www.cisco.com/c/en_in/solutions/internet-of-things/iot-fog-
applications.html
Fog Computing
Fog Computing

More Related Content

What's hot

Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Fog computing
Fog computingFog computing
Fog computing
Parmeshwar Wahatule
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
Er. Ajay Sirsat
 
Fog computing
Fog computingFog computing
Fog computing
Abdul Qadir
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
Prankit Mishra
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
hari krishnan.n
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Sarvesh Meena
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
omkar parab
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 

What's hot (20)

Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Viewers also liked

Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
Angelo Corsaro
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Biren Gandhi
 
fog computing
fog computingfog computing
fog computing
Mphasis
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
Ahmed Banafa
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu
 
Fog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computingFog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computing
ieeepondy
 
Windows Azure Service Bus
Windows Azure Service BusWindows Azure Service Bus
Windows Azure Service Bus
Pavel Revenkov
 
Introduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceIntroduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceTamir Dresher
 
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTSDEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
Nexgen Technology
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
Ahmed Banafa
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storageSameer Mohd
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Azure service bus based on cloud computing
Azure service bus based on cloud computingAzure service bus based on cloud computing
Azure service bus based on cloud computing
arun Prabha
 
Azure Service Bus Overview
Azure Service Bus OverviewAzure Service Bus Overview
Azure Service Bus Overview
BizTalk360
 
Making communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service BusMaking communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service Bus
Particular Software
 

Viewers also liked (18)

Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
fog computing
fog computingfog computing
fog computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Fog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computingFog computing may help to save energy in cloud computing
Fog computing may help to save energy in cloud computing
 
Windows Azure Service Bus
Windows Azure Service BusWindows Azure Service Bus
Windows Azure Service Bus
 
Introduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceIntroduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay Service
 
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTSDEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Azure service bus based on cloud computing
Azure service bus based on cloud computingAzure service bus based on cloud computing
Azure service bus based on cloud computing
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Azure Service Bus Overview
Azure Service Bus OverviewAzure Service Bus Overview
Azure Service Bus Overview
 
Making communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service BusMaking communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service Bus
 

Similar to Fog Computing

Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
Fog ppt
Fog pptFog ppt
Fog ppt
sabafarheen
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
mehedi15
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
MeymunaMohammed1
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
HarshitParkar6677
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
SohamChatterjee47
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Cloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptxCloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptx
ssuser53aac4
 

Similar to Fog Computing (20)

Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptxCloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptx
 

Recently uploaded

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 

Fog Computing

  • 2. CONTENTS  Abstract  Introduction  Existing System  Proposed System  Characteristics of Fog Computing  Cloud Vs. Fog  Scenarios  Architecture  Applications  Examples of Fog Computing  Advantages  Disadvantages  Future Enhancement  Conclusion  References
  • 3. • FOG Computing is an advanced or extended version of cloud computing where the computing takes place at the edge of the network. There are many companies currently spending a lot of research on this topic like Cisco etc. • It is similar to cloud computing, but is far denser in geographical distribution and location and its proximity to end users is more, which means they provide a faster end-user experience than cloud computing and have better performance. • The questions about its complexity, practical feasibility, cost and performance are arising in different research communities. There is also a major concern about it's reliability or durability in performing all sorts of operations performed by cloud computing systems. ABSTRACT
  • 4. INTRODUCTION • CISCO recently delivered the vision of Fog computing to enable applications on billions of connected devices to run directly at the network edge. Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches. Cisco brings the open source Linux and network operating system together in a single networked device. • Fog computing, also known as fog networking, is a decentralized computing infrastructure in which computing resources and application services are distributed in the most logical, efficient place at any point along the continuum from the data source to the cloud. The goal of fog computing is to improve efficiency and reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage. This is often done for efficiency reasons, but it may also be carried out for security and compliance reasons.
  • 5.
  • 6. • A simple three level hierarchy as shown in above figure. • In this framework, each smart things and intefaces is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud. Contd…
  • 7. • Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as- you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications EXISTING SYSTEM
  • 8. DISADVANTAGES  Existing data protection mechanisms such as encryption was failed in securing the data from the attackers.  It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 9. • Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains. PROPOSED SYSTEM
  • 10. ADVANTAGES  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services(Qos) and real time applications.
  • 11. CHARACTERISTICS OF FOG COMPUTING  Edge location, location awareness, and low latency : Fog computing support endpoints with finest services at the edge of the network.  Geographical distribution : The services and application objective of the fog is widely distributed.  Support for mobility : Using LISP protocol fog devices provide mobility techniques like decouple host identity to location identity.  Real time interactions : fog computing requires real time interactions for speedy service.  Heterogeneity : Fog nodes can be deployed in a wide variety of environments.  Interoperability : Fog components must be able to interoperate in order to give wide range of services like streaming.
  • 12. CLOUD vs. FOG Fog – Solution to Cloud’s Limitations • Reduction in data movement across the network resulting in reduced congestion. • Elimination of bottlenecks resulting from centralized computing systems. • Improved security of encrypted data as it stays closer to the end user.
  • 14. Scenarios Smart Grid Internet of Things Decentralized smart building control Software defined networks Smart Traffic Lights Wireless Sensor
  • 15. The design of fog architecture or the key components of fog architecture are discussed below: • Heterogeneous Physical Resources • Fog Abstraction Layer • Fog Service Orchestration Layer •Foglet Software Agent •Distributed Database •Policy-Based Service Orchestration ARCHITECTURE OF FOG TECHNOLOGY
  • 16. Components in Fog architecture
  • 17. • Heterogeneous Physical Resources:  Heterogeneous in nature, ranging from high-speed links connecting enterprise data centers and the core to multiple wireless access technologies towards the edge. 3G/4G, LTE, Wi-Fi etc. • Fog Abstraction Layer:  A uniform and programmable interface for seamless resource management an d control.  The layer provides generic APIs for monitoring, provisioning and controlling physical resources such as CPU, memory, network and energy.
  • 18. • Fog Service Orchestration Layer:  Provides dynamic, policy-based life-cycle management of Fog services.  Managing services on a large volume of Fog nodes with a wide range of capabilities is achieved with the following technology and components:  Foglet Software Agent,  Distributed Database, persistent storage to store policies and resource meta-data,  Policy-Based Service Orchestration, provides policy-based service routing, i.e., routes an incoming service request to the appropriate service instance that confirms to the relevant business policies.
  • 19. Smart Grid:  Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud. Decentralized Smart Building Control:  Wireless sensors are installed to measure temperature, humidity, or levels of various gaseous components in the building atmosphere.  Information can be exchanged among all sensors in the floor and the reading can be combined to form reliable measurements. Smart Cities:  Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within. Health Care:  The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, according to a Markets and Markets report, and fog computing would allow this on a more localized level.
  • 20. • Tech giants Cisco and IBM are the driving forces behind fog computing, and link their concept to the emerging Internet of Things (IoT). • Fog has a direct correlation with IoT. • According to CISCO, the important areas where fog would play a vital role are the following : APPLICATIONS OF FOG
  • 21.
  • 22. Connected cars  Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible.  At some point in time, the connected car will start saving lives by reducing automobile accidents.  Fog computing will be the best option for all internet connected vehicles because fog computing gives real time interaction.
  • 24. In this subsection, we take Man-in-the-middle attack as an example to expose the security problems in Fog Computing. In this attack, gateways serving as Fog devices may be comprised or replaced by fake ones. Man-In-The-Middle Attack:
  • 25.  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services (QoS) and real time applications. ADVANTAGES  Existing data protection mechanisms such as encryption was failed in securing the data from the attackers.  It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access. DISADVANTAGES
  • 26.  Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other.  Next, Fog computing based SDN in vehicular networks will receive due attention. FUTURE ENCHANCEMENT
  • 27.  Fog computing advantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs). We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud. CONCLUSION
  • 28. References  http://www.webopedia.com/TERM/F/fog-computing.html  http://internetofthingsagenda.techtarget.com/definition/fog-computing- fogging  http://www.westbaseuk.com/news/fog-computing-vs-cloud-computing-whats- the-difference/  http://www.cisco.com/c/en_in/solutions/internet-of-things/iot-fog- applications.html