This document provides an overview of fog computing, including its origins at Cisco, its advantages over cloud computing for applications with low latency requirements like IoT, and examples of applications that could benefit like smart cities and healthcare. Fog computing processes data locally at the edge of the network rather than sending all data to the cloud, helping address issues of bandwidth constraints, network congestion, and latency for real-time applications. Security challenges also exist with protecting data and devices at the edge of the network in fog computing environments.
This presentation include some of limitations of cloud computing that motivate cisco to come up with new fog computing .Fog is nothing but cloud or we can say it is an extension of the cloud.
This presentation include some of limitations of cloud computing that motivate cisco to come up with new fog computing .Fog is nothing but cloud or we can say it is an extension of the cloud.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Extends cloud computing services to the edge of the network.
Similar to cloud, Fog provides:
Data
Computation
Storage
Application Services to end users.
Motivations for Fog Computing:
Smart Grid, Smart Traffic Lights in vehicular networks and Software Defined Networks.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks,
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.
Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network .
As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
An increasing number of Consumer and Internet Internet of Things applications require some form of edge computing characterised by low latency, peer-to-peer communication, and mobility. Fog computing has recently emerged as the paradigm to address the needs of edge computing in IoT applications. Fog computing complements Cloud computing to allow the design and implementation of IoT systems that scale better, are more reactive and in which local communication and decision is enabled whenever possible.
This presentation introduces the key concepts behind Fog Computing, compare and contrast it with Cloud Computing and explain how the VORTEX platform enables Fog computing architectures.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Fog computing is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
Fog Computing is a paradigm that extends Cloud Computing and services to the edge of the network, similar to Cloud, Fog provides data, compute, storage, and application services to end-users.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Extends cloud computing services to the edge of the network.
Similar to cloud, Fog provides:
Data
Computation
Storage
Application Services to end users.
Motivations for Fog Computing:
Smart Grid, Smart Traffic Lights in vehicular networks and Software Defined Networks.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks,
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.
Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network .
As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
An increasing number of Consumer and Internet Internet of Things applications require some form of edge computing characterised by low latency, peer-to-peer communication, and mobility. Fog computing has recently emerged as the paradigm to address the needs of edge computing in IoT applications. Fog computing complements Cloud computing to allow the design and implementation of IoT systems that scale better, are more reactive and in which local communication and decision is enabled whenever possible.
This presentation introduces the key concepts behind Fog Computing, compare and contrast it with Cloud Computing and explain how the VORTEX platform enables Fog computing architectures.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Fog computing is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
Fog Computing is a paradigm that extends Cloud Computing and services to the edge of the network, similar to Cloud, Fog provides data, compute, storage, and application services to end-users.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
Fog computing is defined as a decentralized infrastructure that places storage and processing components at the edge of the cloud, where data sources such as application users and sensors exist.It is an architecture that uses edge devices to carry out a substantial amount of computation (edge computing), storage, and communication locally and routed over the Internet backbone.To achieve real-time automation, data capture and analysis has to be done in real-time without having to deal with the high latency and low bandwidth issues that occur during the processing of network data In 2012, Cisco introduced the term fog computing for dispersed cloud infrastructures.. In 2015, Cisco partnered with Microsoft, Dell, Intel, Arm and Princeton University to form the OpenFog Consortium.The consortium's primary goals were to both promote and standardize fog computing. These concepts brought computing resources closer to data sources.Fog computing also differentiates between relevant and irrelevant data. While relevant data is sent to the cloud for storage, irrelevant data is either deleted or transmitted to the appropriate local platform. As such, edge computing and fog computing work in unison to minimize latency and maximize the efficiency associated with cloud-enabled enterprise systemsFog computing consists of various componets such as fog nodes.Fog nodes are independent devices that pick up the generated information. Fog nodes fall under three categories: fog devices, fog servers, and gateways. These devices store necessary data while fog servers also compute this data to decide the course of action. Fog devices are usually linked to fog servers. Fog gateways redirect the information between the various fog devices and servers. With Fog computing, local data storage and scrutiny of time-sensitive data become easier. With this the amount and the distance of passing data to the cloud is reduced, therefore reducing the security challenges.Fog computing enables data processing based on application demands, available networking and computing resources. This reduces the amount of data required to be transferred to the cloud, ultimately saving network bandwidth.Fog computing can run independently and ensure uninterrupted services even with fluctuating network connectivity to the cloud. It performs all time-sensitive actions close to end users which meets latency constraints of IoT applications.
IoT applications where data is generated in terabytes or more, where a quick and large amount of data processing is required and sending data to the cloud back and forth is not feasible, are good candidates for fog computing. Fog computing provides real-time processing and event responses which are critical in healthcare. Besides, it also addresses issues regarding network connectivity and traffic required for remote storage, processing and medical record retrieval from the cloud.
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
Sending a business e-mail, watching a YouTube video, making an online video call meeting, or playing a video game online requires considerable data flow. It necessitates such massive data flow in the direction of servers in data centers. Cloud computing prefers remote data processing and substantial storage systems to develop online apps we use daily. But we must know that other decentralized cloud computing systems exist. Fog computing technology is growing wildly in popularity. As per fog technology experts, the global fog technology market will reach nearly $2.3 billion at the end of 2032. The market for fog technology was $196.7 million at the end of 2022.
Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the internet backbone.
Internet of Things (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined.
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
The term “Cloud Computing” is a recent buzzword in the IT world. Behind this fancy poetic phrase, there lies a true picture for the future of computing for both in technical prospective and social prospective. However, the term “Cloud Computing” is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new but it came in the way back in 1990s along with distributed computing approaches like grid computing. Cloud computing aimed at providing IT as a service to the cloud users on-demand basic with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be used in the field of e-governance and in rural development perspective in the developing country like India.
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
This article delves into the intricacies of Fog computing, exploring its definition, key components, benefits, and its transformative impact on various industries.
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
Fog computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Dening characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Het-erogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid , Smart Cities, and, in general, Wireless Sensors and Actuators Net-works (WSANs).
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
2. CONTENTS
Introduction
Originator
Fog Concept
Need for FOG Computing
Existing Systems – Cloud
Limitations of Cloud
Limitations overcomes in FOG
Cloud V/S FOG
Applications of FOG
Before & After FOG
Advantages of FOG
Security issues in FOG
Future Enhancements
Conclusion
Refrences
3. INTRODUCTION
Fog Computing is a paradigm that extends Cloud computing and services to
the edge of the network.
Similar to Cloud, Fog provides data, compute, storage, and application services
to end-users. The motivation of Fog computing lies in a series of real scenarios,
such as Smart Grid, smart traffic lights in vehicular networks and software
defined networks.
In Fog Computing, data can be processed locally in smart devices rather than
being sent to the cloud for processing.
Fog computing is one approach to dealing with the demands of the ever-
increasing number of Internet-connected devices sometimes referred to as the
Internet of Things (IoT).
4. ORIGINATOR
CISCO recently delivered the vision of fog computing to enable applications on billions of
connected devices to run directly at the network edge. Customers can develop, manage
and run software applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux and network operating
system together in a single networked device.
6. NEED FOR FOG COMPUTING
Fog Computing extends the cloud computing paradigm to the edge
of the network. While fog and cloud use the same resources
(networking, compute, and storage) and share many of the same
mechanisms and attributes (virtualization, multi-tenancy) the
extension is a non-trivial one in that there exist some fundamental
differences stemming from the reason fog computing was
developed: to address applications and services that do not fit the
paradigm of the cloud
8. EXISTING SYSTEMS - CLOUD
Cloud computing has provided many opportunities for enterprises by offering their
customers a range of computing services. Current “pay-as-you-go” Cloud computing model
becomes an efficient alternative to owning and managing private data centers for customers
facing Web applications
9. LIMITATIONS OF CLOUD
Cloud computing has so many advantages, it also suffers from certain shortcomings
too. Those are:
High capacity(bandwidth)
Client access link.
High latency
security
10. LIMITATIONS OVERCOMES IN FOG
Reduction in data movement across the network resulting in reduced
congestion.
Elimination of bottlenecks resulting from centralized computing
systems.
Improved security of encrypted data as it stays closer to the end
user.
14. Tech giants Cisco and IBM are the driving forces behind fog
computing, and link their concept to the emerging Internet of Things
(IoT).
Most of the buzz around fog has a direct correlation with the
emergence of the Internet of Things (IoT)
Health care: The cloud computing market for healthcare
is expected to reach $5.4 billion by 2017, and fog computing would
allow this on a more localized level.
15. Connected cars: Fog computing is ideal for Connected Vehicles (CV) because
real-time interactions will make communications between cars, access points and
traffic lights as safe and efficient as possible
16. Smart cities: Fog computing would be able to
obtain sensor data on all levels, and integrate all the
mutually independent network entities within
17. Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes
and human to machine interactions (HMI), which would work in cooperation with
the cloud
19. ADVANTAGES OF FOG
Fog can be distinguished from Cloud by its proximity to end-users.
The dense geographical distribution and its support for mobility.
It provides low latency, location awareness, and improves quality-
of-services (QoS) and real time applications.
20. SECURITY ISSUES IN FOG
The main security issues are authentication at different levels of gateways as
well as (in case of smart grids) at the smart meters installed in the consumer’s
home. Each smart meter and smart appliance has an IP address. A
malicious user can either tamper with its own smart meter, report false readings,
or spoof IP addresses.
21. FUTURE ENHANCEMENTS
Future work will expand on the Fog computing paradigm in Smart Grid. In this
scenario, two models for Fog devices can be developed. Independent Fog devices
consult directly with the Cloud for periodic updates on price and demands, while
interconnected Fog devices may consult each other.
Next, Fog computing based SDN in vehicular networks will receive due attention.
22. CONCLUSION
Fog Computing will grow in helping the emerging network
paradigms that require faster processing with less delay
and delay jitter ,cloud computing would serve the business
community meeting their high end computing demands lowering the
cost based on a utility pricing model.