SlideShare a Scribd company logo
Submitted To:
Amit Chakraborty Chhoton (AAC)
Lecturer
Daffodil International University
Group Name: G-5
Group Members:
1. Mehedi Hasan (153-15-6615)
2. Abdul-Mukit-Mondol (153-15-6616)
3. Ibrahim Khalil Rahib (153-15-6646)
4. Fahamida Naznin (153-15-6660)
5. Joy Kumar Howlader (153-15-6696)
What is Fog Computing?
History of Fog Computing
Existing System
Disadvantages of Existing System
Proposed System
Advantages of Proposed System
Characteristics of Fog Computing
Cloud vs. Fog Computing
Architecture of Fog Computing
Applications of Fog Computing
References
Fog Computing is a technology that extends cloud
computing and services to the edge of the network.
It provides data, compute, storage and application
services to the users like cloud.
Fog computing is an emerging technology that is basically
used for Internet of Things.
The term fog computing is often associated with Cisco.
"Cisco Fog Computing" is a registered name; “fog
computing” is open to the community at large. The choice of
the word "fog" is meant to convey the idea that the
advantages of cloud computing can and should be brought
closer to the data source. (In meteorology, fog is simply a
cloud that is close to the ground).
Things Interface
Fog Computing
Cloud computing has provided
many opportunities for
enterprises by offering their
customers a range of computing
services. Current “pay-as-you-go”
Cloud computing model becomes an
efficient alternative to owning and
managing private data centers for
customers facing Web application.
Existing data protection mechanisms such as
encryption was failed in securing the data from the
attackers.
It does not verify whether the user was authorized
or not.
Cloud computing security does not focus on ways
of secure the data from unauthorized access.
Unlike traditional data centers, Fog
devices are geographically distributed
over heterogeneous platforms,
spanning multiple management
domains. Cisco is interested in
innovative proposals that facilitate
service mobility across platforms, and
technologies that preserve end-user
and content security and privacy
across domains.
 Fog can be distinguished from Cloud by its
proximity to end-users.
The dense geographical distribution and its
support for mobility.
It provides low latency, location awareness, and
improves quality-of-services (Qos) and real time
applications.
Edge location, location awareness, and low latency : Fog
computing support endpoints with finest services at the
edge of the network.
Geographical distribution : The services and application
objective of the fog is widely distributed.
Support for mobility : Using LISP protocol fog devices
provide mobility techniques like decouple host identity to
location identity.
Real time interactions : Fog computing requires real time
interactions for speedy service.
Heterogeneity : Fog nodes can be deployed in a wide
variety of environments.
Interoperability : Fog components must be able to
interoperate in order to give wide range of services like
streaming.
Tech giants Cisco and IBM are the driving forces
behind fog computing, and link their concept to the
emerging Internet of Things (IoT).
Most of the buzz around fog has a direct
correlation with the emergence of the Internet of
Things (IoT).
According to CISCO, the important areas where
fog would play a vital role are the following :
Connected Cars:
Fog computing is ideal for Connected Vehicles
(CV) because real-time interactions will make
communications between cars, access points and
traffic lights as safe and efficient as possible.
At some point in time, the connected car will start
saving lives by reducing automobile accidents.
Connected Vehicles communicating with each other
Smart Grids :
Fog computing allows fast, machine-to-machine
(M2M) handshakes and human to machine
interactions (HMI), which would work in
cooperation with the cloud.
Everything in the grids communicating with each other
Smart Cities:
Fog computing would be able to obtain sensor
data on all levels, and integrate all the mutually
independent network entities within.
Everything is connected in smart city
Health Care:
The cloud computing market for healthcare
was expected to reach $5.4 billion by 2017, and
fog computing would allow this on a more
localized level.
Every component of the home is inter-related, they are collecting data and analyzing them.
Every machines are communicating with each other.
Every sensor, machines are working together to better analyze the data.
https://en.wikipedia.org/wiki/Fog_computing
https://internetofthingsagenda.techtarget.com/definition/fo
g-computing-fogging
https://www.westbase.io/fog-computing-vs-cloud-
computing-whats-the-difference/
https://www.cisco.com/c/en_in/solutions/internet-of-
things/iot-fog-applications.html
Fog computing presentration
Fog computing presentration

More Related Content

What's hot

Fog
FogFog
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
Rahul Yadav
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Biren Gandhi
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
Prankit Mishra
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
AbdulMajidFarooqi
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
sreelesh balan
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Rashid Ansari
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
Thesis Scientist Private Limited
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
Ahmed Banafa
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
San Francisco Fog Computing Meetup
San Francisco Fog Computing MeetupSan Francisco Fog Computing Meetup
San Francisco Fog Computing Meetup
Breaux Walker
 
PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
PhD Services
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
Biren Gandhi
 
Fog computing
Fog computingFog computing
Fog computing
Abdul Qadir
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 

What's hot (20)

Fog
FogFog
Fog
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
San Francisco Fog Computing Meetup
San Francisco Fog Computing MeetupSan Francisco Fog Computing Meetup
San Francisco Fog Computing Meetup
 
PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 

Similar to Fog computing presentration

Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
omkar parab
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
HarshitParkar6677
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Fog-Computing-Applications.pdf
Fog-Computing-Applications.pdfFog-Computing-Applications.pdf
Fog-Computing-Applications.pdf
engdlshadfm
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
iosrjce
 
B017660813
B017660813B017660813
B017660813
IOSR Journals
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
IJERA Editor
 

Similar to Fog computing presentration (20)

Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Fog-Computing-Applications.pdf
Fog-Computing-Applications.pdfFog-Computing-Applications.pdf
Fog-Computing-Applications.pdf
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
B017660813
B017660813B017660813
B017660813
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 

Recently uploaded

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 

Recently uploaded (20)

LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 

Fog computing presentration

  • 1. Submitted To: Amit Chakraborty Chhoton (AAC) Lecturer Daffodil International University
  • 2. Group Name: G-5 Group Members: 1. Mehedi Hasan (153-15-6615) 2. Abdul-Mukit-Mondol (153-15-6616) 3. Ibrahim Khalil Rahib (153-15-6646) 4. Fahamida Naznin (153-15-6660) 5. Joy Kumar Howlader (153-15-6696)
  • 3. What is Fog Computing? History of Fog Computing Existing System Disadvantages of Existing System Proposed System Advantages of Proposed System Characteristics of Fog Computing Cloud vs. Fog Computing Architecture of Fog Computing Applications of Fog Computing References
  • 4. Fog Computing is a technology that extends cloud computing and services to the edge of the network. It provides data, compute, storage and application services to the users like cloud. Fog computing is an emerging technology that is basically used for Internet of Things.
  • 5. The term fog computing is often associated with Cisco. "Cisco Fog Computing" is a registered name; “fog computing” is open to the community at large. The choice of the word "fog" is meant to convey the idea that the advantages of cloud computing can and should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground).
  • 8. Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as-you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web application.
  • 9. Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. It does not verify whether the user was authorized or not. Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 10. Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains.
  • 11.  Fog can be distinguished from Cloud by its proximity to end-users. The dense geographical distribution and its support for mobility. It provides low latency, location awareness, and improves quality-of-services (Qos) and real time applications.
  • 12. Edge location, location awareness, and low latency : Fog computing support endpoints with finest services at the edge of the network. Geographical distribution : The services and application objective of the fog is widely distributed. Support for mobility : Using LISP protocol fog devices provide mobility techniques like decouple host identity to location identity.
  • 13. Real time interactions : Fog computing requires real time interactions for speedy service. Heterogeneity : Fog nodes can be deployed in a wide variety of environments. Interoperability : Fog components must be able to interoperate in order to give wide range of services like streaming.
  • 14.
  • 15.
  • 16. Tech giants Cisco and IBM are the driving forces behind fog computing, and link their concept to the emerging Internet of Things (IoT). Most of the buzz around fog has a direct correlation with the emergence of the Internet of Things (IoT). According to CISCO, the important areas where fog would play a vital role are the following :
  • 17. Connected Cars: Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible. At some point in time, the connected car will start saving lives by reducing automobile accidents.
  • 19. Smart Grids : Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud.
  • 20. Everything in the grids communicating with each other
  • 21. Smart Cities: Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within.
  • 22. Everything is connected in smart city
  • 23. Health Care: The cloud computing market for healthcare was expected to reach $5.4 billion by 2017, and fog computing would allow this on a more localized level.
  • 24.
  • 25. Every component of the home is inter-related, they are collecting data and analyzing them.
  • 26. Every machines are communicating with each other.
  • 27. Every sensor, machines are working together to better analyze the data.