SlideShare a Scribd company logo
FOG COMPUTING
MADE BY: PRANKIT MISHRA
141CC00007
CONTENTS
 Introduction
 Originator
 Fog Concept
 Need for FOG Computing
 Existing Systems – Cloud
 Limitations of Cloud
 Limitations overcomes in FOG
 Cloud V/S FOG
 Applications of FOG
 Before & After FOG
 Advantages of FOG
 Security issues in FOG
 Future Enhancements
 Conclusion
 Refrences
INTRODUCTION
 Fog Computing is a paradigm that extends Cloud computing and services to
the edge of the network.
 Similar to Cloud, Fog provides data, compute, storage, and application services
to end-users. The motivation of Fog computing lies in a series of real scenarios,
such as Smart Grid, smart traffic lights in vehicular networks and software
defined networks.
 In Fog Computing, data can be processed locally in smart devices rather than
being sent to the cloud for processing.
 Fog computing is one approach to dealing with the demands of the ever-
increasing number of Internet-connected devices sometimes referred to as the
Internet of Things (IoT).
ORIGINATOR
CISCO recently delivered the vision of fog computing to enable applications on billions of
connected devices to run directly at the network edge. Customers can develop, manage
and run software applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux and network operating
system together in a single networked device.
FOG CONCEPT
NEED FOR FOG COMPUTING
 Fog Computing extends the cloud computing paradigm to the edge
of the network. While fog and cloud use the same resources
(networking, compute, and storage) and share many of the same
mechanisms and attributes (virtualization, multi-tenancy) the
extension is a non-trivial one in that there exist some fundamental
differences stemming from the reason fog computing was
developed: to address applications and services that do not fit the
paradigm of the cloud
CONTINUED…
 Fog Computing Keeps Data Right Where the Internet of Things Needs it.
EXISTING SYSTEMS - CLOUD
Cloud computing has provided many opportunities for enterprises by offering their
customers a range of computing services. Current “pay-as-you-go” Cloud computing model
becomes an efficient alternative to owning and managing private data centers for customers
facing Web applications
LIMITATIONS OF CLOUD
Cloud computing has so many advantages, it also suffers from certain shortcomings
too. Those are:
 High capacity(bandwidth)
 Client access link.
 High latency
 security
LIMITATIONS OVERCOMES IN FOG
 Reduction in data movement across the network resulting in reduced
congestion.
 Elimination of bottlenecks resulting from centralized computing
systems.
 Improved security of encrypted data as it stays closer to the end
user.
CLOUD V/S FOG
CONTINUED….
APPLICATIONS OF FOG
 Tech giants Cisco and IBM are the driving forces behind fog
computing, and link their concept to the emerging Internet of Things
(IoT).
 Most of the buzz around fog has a direct correlation with the
emergence of the Internet of Things (IoT)
 Health care: The cloud computing market for healthcare
is expected to reach $5.4 billion by 2017, and fog computing would
allow this on a more localized level.
 Connected cars: Fog computing is ideal for Connected Vehicles (CV) because
real-time interactions will make communications between cars, access points and
traffic lights as safe and efficient as possible
 Smart cities: Fog computing would be able to
obtain sensor data on all levels, and integrate all the
mutually independent network entities within
 Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes
and human to machine interactions (HMI), which would work in cooperation with
the cloud
BEFORE & AFTER OF FOG
ADVANTAGES OF FOG
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-
of-services (QoS) and real time applications.
SECURITY ISSUES IN FOG
 The main security issues are authentication at different levels of gateways as
well as (in case of smart grids) at the smart meters installed in the consumer’s
home. Each smart meter and smart appliance has an IP address. A
malicious user can either tamper with its own smart meter, report false readings,
or spoof IP addresses.
FUTURE ENHANCEMENTS
 Future work will expand on the Fog computing paradigm in Smart Grid. In this
scenario, two models for Fog devices can be developed. Independent Fog devices
consult directly with the Cloud for periodic updates on price and demands, while
interconnected Fog devices may consult each other.
 Next, Fog computing based SDN in vehicular networks will receive due attention.
CONCLUSION
 Fog Computing will grow in helping the emerging network
paradigms that require faster processing with less delay
and delay jitter ,cloud computing would serve the business
community meeting their high end computing demands lowering the
cost based on a utility pricing model.
REFRENCES
 https://www.cisco.com/c/dam/en_us/solutions/trends/iot/.../computi
ng-overview.pdf
 http://internetofthingsagenda.techtarget.com/definition/fog-
computing-fogging
 www.forbes.com/sites/.../is-fog-computing-the-next-big-thing-in-
internet-of-things/
Fog computing : The new age Technology

More Related Content

What's hot

Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Mohit Jaju
 
Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
Angelo Corsaro
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
Ahmed Banafa
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S
 
Fog computing
Fog computingFog computing
Fog computing
Abdul Qadir
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 

What's hot (20)

Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 

Similar to Fog computing : The new age Technology

Fog ppt
Fog pptFog ppt
Fog ppt
sabafarheen
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
HarshitParkar6677
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
mehedi15
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
An introduction to cloud computing
An introduction to cloud computingAn introduction to cloud computing
An introduction to cloud computing
Jagan Mohan Bishoyi
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
fog computing
fog computingfog computing
fog computing
AMITTRIPATHI182
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
IJERA Editor
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 

Similar to Fog computing : The new age Technology (20)

Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing
Fog computing Fog computing
Fog computing
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
An introduction to cloud computing
An introduction to cloud computingAn introduction to cloud computing
An introduction to cloud computing
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
fog computing
fog computingfog computing
fog computing
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 

More from Prankit Mishra

Tourist management system using .NET
Tourist management system using .NETTourist management system using .NET
Tourist management system using .NET
Prankit Mishra
 
Remote Method Innovation (RMI) In JAVA
Remote Method Innovation (RMI) In JAVARemote Method Innovation (RMI) In JAVA
Remote Method Innovation (RMI) In JAVA
Prankit Mishra
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
Prankit Mishra
 
Ajanta and Ellora Caves
Ajanta and Ellora CavesAjanta and Ellora Caves
Ajanta and Ellora Caves
Prankit Mishra
 
Probability In Discrete Structure of Computer Science
Probability In Discrete Structure of Computer ScienceProbability In Discrete Structure of Computer Science
Probability In Discrete Structure of Computer Science
Prankit Mishra
 
Cryptography using probability
Cryptography using probabilityCryptography using probability
Cryptography using probability
Prankit Mishra
 
Bipolar Junction Transistor
Bipolar Junction TransistorBipolar Junction Transistor
Bipolar Junction Transistor
Prankit Mishra
 
Autotransformers
AutotransformersAutotransformers
Autotransformers
Prankit Mishra
 
Top down parsing
Top down parsingTop down parsing
Top down parsing
Prankit Mishra
 
Forward error correction
Forward error correctionForward error correction
Forward error correction
Prankit Mishra
 
DDR SDRAMs
DDR SDRAMsDDR SDRAMs
DDR SDRAMs
Prankit Mishra
 

More from Prankit Mishra (11)

Tourist management system using .NET
Tourist management system using .NETTourist management system using .NET
Tourist management system using .NET
 
Remote Method Innovation (RMI) In JAVA
Remote Method Innovation (RMI) In JAVARemote Method Innovation (RMI) In JAVA
Remote Method Innovation (RMI) In JAVA
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Ajanta and Ellora Caves
Ajanta and Ellora CavesAjanta and Ellora Caves
Ajanta and Ellora Caves
 
Probability In Discrete Structure of Computer Science
Probability In Discrete Structure of Computer ScienceProbability In Discrete Structure of Computer Science
Probability In Discrete Structure of Computer Science
 
Cryptography using probability
Cryptography using probabilityCryptography using probability
Cryptography using probability
 
Bipolar Junction Transistor
Bipolar Junction TransistorBipolar Junction Transistor
Bipolar Junction Transistor
 
Autotransformers
AutotransformersAutotransformers
Autotransformers
 
Top down parsing
Top down parsingTop down parsing
Top down parsing
 
Forward error correction
Forward error correctionForward error correction
Forward error correction
 
DDR SDRAMs
DDR SDRAMsDDR SDRAMs
DDR SDRAMs
 

Recently uploaded

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Fog computing : The new age Technology

  • 1. FOG COMPUTING MADE BY: PRANKIT MISHRA 141CC00007
  • 2. CONTENTS  Introduction  Originator  Fog Concept  Need for FOG Computing  Existing Systems – Cloud  Limitations of Cloud  Limitations overcomes in FOG  Cloud V/S FOG  Applications of FOG  Before & After FOG  Advantages of FOG  Security issues in FOG  Future Enhancements  Conclusion  Refrences
  • 3. INTRODUCTION  Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network.  Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.  In Fog Computing, data can be processed locally in smart devices rather than being sent to the cloud for processing.  Fog computing is one approach to dealing with the demands of the ever- increasing number of Internet-connected devices sometimes referred to as the Internet of Things (IoT).
  • 4. ORIGINATOR CISCO recently delivered the vision of fog computing to enable applications on billions of connected devices to run directly at the network edge. Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches. Cisco brings the open source Linux and network operating system together in a single networked device.
  • 6. NEED FOR FOG COMPUTING  Fog Computing extends the cloud computing paradigm to the edge of the network. While fog and cloud use the same resources (networking, compute, and storage) and share many of the same mechanisms and attributes (virtualization, multi-tenancy) the extension is a non-trivial one in that there exist some fundamental differences stemming from the reason fog computing was developed: to address applications and services that do not fit the paradigm of the cloud
  • 7. CONTINUED…  Fog Computing Keeps Data Right Where the Internet of Things Needs it.
  • 8. EXISTING SYSTEMS - CLOUD Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as-you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications
  • 9. LIMITATIONS OF CLOUD Cloud computing has so many advantages, it also suffers from certain shortcomings too. Those are:  High capacity(bandwidth)  Client access link.  High latency  security
  • 10. LIMITATIONS OVERCOMES IN FOG  Reduction in data movement across the network resulting in reduced congestion.  Elimination of bottlenecks resulting from centralized computing systems.  Improved security of encrypted data as it stays closer to the end user.
  • 14.  Tech giants Cisco and IBM are the driving forces behind fog computing, and link their concept to the emerging Internet of Things (IoT).  Most of the buzz around fog has a direct correlation with the emergence of the Internet of Things (IoT)  Health care: The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, and fog computing would allow this on a more localized level.
  • 15.  Connected cars: Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible
  • 16.  Smart cities: Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within
  • 17.  Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud
  • 18. BEFORE & AFTER OF FOG
  • 19. ADVANTAGES OF FOG  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality- of-services (QoS) and real time applications.
  • 20. SECURITY ISSUES IN FOG  The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
  • 21. FUTURE ENHANCEMENTS  Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other.  Next, Fog computing based SDN in vehicular networks will receive due attention.
  • 22. CONCLUSION  Fog Computing will grow in helping the emerging network paradigms that require faster processing with less delay and delay jitter ,cloud computing would serve the business community meeting their high end computing demands lowering the cost based on a utility pricing model.