SlideShare a Scribd company logo
1 of 34
Download to read offline
FOG
COMPUTING
BY : SHIVANGI BALI
Whereas the cloud is "up there" in the sky somewhere, distant and remote and
deliberately abstracted. The "fog" is close to the ground, right where things are
getting done.
Just like the cloud, fog computing is expected to open new business models.
But what a fog computing is?
EXISTING SYSTEM
CLOUD COMPUTING
In past couple of years, the main idea was given to build mega
data center architecture with the demand of centralized
computing services called centralize cloud computing (CC)
model.
Examples of cloud computing are:
Google, Amazon, IBM, and Microsoft Azure.
Cloud computing has provided many opportunities for
enterprises by offering their customer a range of computing
services. Current “pay as you go” Cloud computing model
becomes an efficient alternative to owning and managing
private data centres for customers facing Web Applications.
PROBLEMS WITH CLOUD COMPUTING
As the Internet of Things grows, businesses face a growing need to analyze data from sources at the edge of a network, whether mobile phones,
gateways, or IoT sensors. Cloud computing has a disadvantage:
➢It can’t process data quickly enough for modern business applications. The IoT owes its explosive growth to the connection of physical things
and operation technologies (OT) to analytics and machine learning applications, which can help glean insights from device-generated data and
enable devices to make “smart” decisions without human intervention. Currently, such resources are mostly being provided by cloud service
providers, where the computation and storage capacity exists.
➢ However, despite its power, the cloud model is not applicable to environments where operations are time-critical or internet connectivity is poor.
This is especially true in scenarios such as telemedicine and patient care, where milliseconds can have fatal consequences.
➢The same can be said about vehicle to vehicle communications, where the prevention of collisions and accidents can’t afford the latency caused
by the roundtrip to the cloud server. “The cloud paradigm is like having your brain command your limbs from miles away — it won’t help you
where you need quick reflexes.”
➢Moreover, having every device connected to the cloud and sending raw data over the internet can have privacy, security and legal implications,
especially when dealing with sensitive data that is subject to separate regulations in different countries. IoT nodes are closer to the action, but for
the moment, they do not have the computing and storage resources to perform analytics and machine learning tasks. Cloud servers, on the other
hand, have the horsepower, but are too far away to process data and respond in time.
PROPOSED SYSTEM
➢Fog computing
or fog networking, also known as fogging, is an architecture that uses
edge device to carry out a substantial amount of computation, storage,
and communication locally and routed over the Internet backbone.
➢Fog computing is a decentralized computing infrastructure in which
data, compute, storage and applications are located somewhere
between the data source and the cloud. Like edge computing, fog
computing brings the advantages and power of the cloud closer to
where data is created and acted upon. Many people use the terms fog
computing and edge computing interchangeably because both involve
bringing intelligence and processing closer to where the data is
created. This is often done to improve efficiency, though it might also
be done for security and compliance reasons.
➢ CISCO recently delivered the vision of fog computing to enable
applications on billions of connected devices, already connected in
the Internet of Things (IoT), to run directly at the network edge.
Customers can develop, manage and run software applications on
Cisco IOx framework of networked devices, including hardened
routers, switches and IP video cameras. Cisco IOx brings the open
source Linux and Cisco IOS network operating system together in a
single networked device (initially in routers).
Data Centres
End-Devices
Nodes
ARCHITECTURE
Proposed by CISCO
HOW FOG COMPUTING WORKS
Fog networking complements -- doesn't replace -- cloud computing; fogging enables short-term analytics at the edge,
while the cloud performs resource-intensive, longer-term analytics.
Fog computing uses the concept of ‘fog nodes.’ These fog nodes are located closer to the data source and have higher
processing and storage capabilities. Fog nodes can process the data far quicker than sending the request to the cloud
for centralized processing.
The cloud is getting cluttered due to the enormous number of devices connecting to the internet. Since cloud
computing is not viable in some cases, it has become necessary to use fog computing for IoT devices. It can handle
the enormous data generated by these devices.
When implemented, fog-empowered devices locally analyze time-critical data that includes alarm status, device
status, fault warnings, and so on. This minimizes latency and prevents major damage. Fog computing can effectively
reduce the amount of bandwidth required, which in turn speeds up the communication with the cloud and various
sensors.
WHEN TO USE FOG COMPUTING?
Fog Computing can be used in the following scenarios:
➢It is used when only selected data is required to send to the cloud. This selected data is chosen for long term storage
and is less frequently accessed by the host.
➢It is used whenever a large number of services need to be provided over a large area at different geographical
locations.
➢Devices that are subjected to rigorous computations and processing's must use fog computing.
➢Real-world examples where fog computing is used are in IoT devices (e.g. Car-to-Car communication), Devices
with Sensors, Cameras (IIoT-Industrial Internet of Things), etc.
STEP-BY-
STEP FOG
COMPUTING
PROCESS:
Signals are wired from IoT
devices to an automation
controller which executes
a control system program
to automate those
devices.
A control system program
wires data through a
protocol gateway.
Data is converted into a
protocol such as HTTP so
that it can be understood
easily by internet-based
services.
A fog node collects the
data for further analysis.
It filters the data and saves
it for later use.
Cloud Architecture with and without Fog Computing
Cloud Architecture before the advent of fog computing
Cloud Architecture after the advent of fog computing
FOG COMPUTING CHARACTERISTICS
1. Geographical distribution:
The services and application
objective of the fog is widely
distributed.
2. Support for mobility:
Fog devices provide mobility
techniques like decouple host
identity to location identity.
3. Real time interactions:
Fog computing requires real
time interactions for speedy
service.
4. Heterogeneity:
Fog nodes can be deployed in a
wide variety of environments.
5. Interoperability Fog
components must be able to
interoperate in order to give
wide range of services like
streaming.
6. Decentralization:
The fog computing
architecture is decentralized.
There is no central server to
manage computing resources
and services. Therefore, fog
nodes are self-organizing and
collaborate to provide end
users with real-time IoT
applications
Save storage space:
Fog computing is one of the
best options to avoid improper
or unrelated data to move to
the whole network, thus will
save storage space and
decrease the latency.
ADVANTAGES OF FOG COMPUTING
➢It offers better security.
➢Fog nodes can be protected using same procedures followed in IT environment.
➢It processes selected data locally instead of sending them to the cloud for processing. Hence it can save network bandwidth. This leads to
lower operational costs.
➢It reduces latency requirements and hence quick decisions can be made. This helps in avoiding accidents.
➢It offers better privacy to the users data as they are analyzed locally instead of sending them to the cloud. Moreover IT team can manage
and control the devices.
➢It is easy to develop fog applications using right tools which can drive machines as per customers need.
➢Fog nodes are mobile in nature. Hence they can join and leave the network at any time.
➢ Fog nodes can withstand harsh environmental conditions in places such as tracks, vehicles, under sea, factory
floors etc. Moreover it can be installed in remote locations.
➢ Fog computing offers reduction in latency as data are analyzed locally. This is due to less round trip time and less amount of data
bandwidth.
DISADVANTAGES OF FOG COMPUTING
➢ Encryption algorithms and security policies make it more difficult for arbitrary devices to exchange data. Any
mistakes in security algorithms lead to exposure of data to the hackers.
➢Other security issues are IP address spoofing, man in the middle attacks, wireless network security etc.
➢To achieve high data consistency in the the fog computing is challenging and requires more efforts.
➢Fog computing will realize global storage concept with infinite size and speed of local storage but data management is
a challenge.
➢Trust and authentication are major concerns.
➢Scheduling is complex as tasks can be moved between client devices, fog nodes and back end cloud servers.
➢Power consumption is high in fog nodes compare to centralized cloud architecture.
Advantages of FOG computing over CLOUD computing:
CLOUD COMPUTING FOG COMPUTING
Data and applications are processed in a cloud, which is
time consuming task for large data.
Rather than presenting and working from a centralized
cloud, fog operates on network edge. So it consumes
less time.
Problems of bandwidth, as a result of sending every bit
data over cloud computing
Less demand of bandwidth, as every bit of data’s were
aggregated at certain access point instead of sending
over cloud channels
Slow response time and scalability problem as a result
of depending servers that are located at remote places.
By setting small servers called edge servers in visibility
of user, it is possible for a fog computing platform to
avoid response time and scalability issues
CHALLENGES OF FOG COMPUTING
➢Privacy: Privacy concern is always there when there are many networks involved. Since fog computing is based on wireless technology, there
is a huge concern regarding network privacy. There are so many fog nodes that each end-user is accessible to them and because of this more
sensitive information passes from end-users to the fog nodes.
➢Security: Fog computing security challenge arise as there are many devices connected to fog nodes and at different gateways. Each device has
a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog
node.
➢Fog Servers: The right placement of fog servers should be there so that it can deliver its maximum service. The company should analyze the
demand and work done by the fog node before placing it will help in reducing the maintenance cost.
➢Energy consumption: Energy consumption is very high in fog computing as the number of fog nodes present in the fog environment are high
and require energy to work. Companies should try to minimize the energy requirement by the fog nodes so that they should become more
energy-efficient and save costs.
➢Delay in Computing: Delays due to Data aggregation, Resource over-usage reduces the effectives of services provided by the fog servers,
causing delay in computing data. Data Aggregation should take place before data processing, Resource-limited fog nodes should be designed
scheduling by using priority and mobility model.
FOG COMPUTING TECHNOLOGY
➢5G Technologies: Fog computing focuses on serving customized location-based applications to mobile users. The Fog layers
can be adapted by using the existing accessing networks, e.g., WiFi, or emerging 5G wireless technologies with a virtualized
architecture.
➢Network Function Virtualization (NFV): In contrast NFV which targets to enabled virtualized network functions inside
network nodes, e.g., switches and routers, Fog computing aims at enabling virtualized location-based applications at the edge
device and providing desirable services to localized mobile users.
➢Software-defined Networking (SDN): The Fog computing, as the local surrogate of cloud, needs to synchronize frequently
with cloud for data update and support. With a global network view, the cloud can manage the entire network using a SDN
approach.
APPLICATIONS
OF FOG COMPUTING
Smart health gadgets and devices can
receive best services from fog
devices at network edge. No need to
send service request to cloud server.
HEALTHCARE:
Fog device enables cars to talk
with each other to avoid accidents.
It also helps in getting information
about low crowded path.
CAR
COMMUNICATION:
Fog computing would be able to
obtain sensor data on all the levels,
and integrate all the mutually
independent network entities
within.
Smart city:
Smart electric devices can switch
to other energy sources like solar
and winds based on demand for
energy, its attainability and low
cost.
SMART GRID:
Lights Fog enables automatic
opening of signals based on
dynamic situation of traffic signals.
Also, it can detect ambulance and
open lanes for it.
SMART TRAFFIC:
All sensors in the building can
communicate and exchange with each
other and with Fog device. Fog device
performs analysis on combined data.
Connected devices may react in
response to data analysis and distributed
decision making.
SMART BUILDING
Control:
CASE STUDEY
A REVIEW AND DISCUSSION
FOG COMPUTING IN HEALTHCARE
CHALLENGES FOR HEALTHCARE:
➢Healthcare system is most countries face enormous challenges that will increase due to aging population
and the rise of chronic diseases.
➢Growing nursing staff shortage.
➢Much time wasted in hospitals by manually measuring biometric parameters and transferring the data
between systems.
REQUIREMENTS OF HEALTHCARE APPLICATIONS
BANDWIDTH of at least 20.48 kbit/s and 96 kbit/s. Bandwidth For ECG, latencies of up to 2 to 4
seconds in real-time monitoring are acceptable.
Latency some in-body sensors rely on energy-harvesting, either by heat or kinetic energy. some
sensors may require an operation of the patient when battery needs replacement.
Energy-Efficiency Depending on what data is used for, system failures have different consequences, from
minor inconvenience to serious threat to the patients’ lives.
Dependability the security requirements in healthcare are high. Security Systems, even when provided
by different vendors, should be interoperable with each other.
Interoperability system even when provided by the different vendors, should be interoperable with each
other.
VISION OF FOG COMPUTING IN HEALTHCARE
➢Flexibility of Computation locus: The location can be dynamic and depend on the current context, environment
and application requirements.
➢ Integration: Within fog computing architecture, new sensors can be added to the existing infrastructure.
• Fog computing can also serve as a compatibility layer to translate between various standards.
➢Patient mobility: Application-specific infrastructure also limits the area where patients can be monitored.
• The transitions between different environments can be managed more gradually.
➢New Applications: Fog computing will provide latency and response time improvements, as well as energy
savings for wearable and low-cost devices, while performing complex tasks such as fall detection.
• Internet of Health care things.
Healthcare Application with and without Fog Computing
WITHOUT FOG COMPUTING WITH FOG COMPUTING
SECURITY ISSUES
The main security issues are authentication at different levels of gateways as well as in case of smart grids at the
smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A
malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
Example: MAN-IN –MIDDLE-ATTACK
In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog
computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones .
CONCLUSION
Fog computing advantages for services in several domains, such
as Smart Grid, wireless sensor networks, Internet of Things (IoT)
and software defined networks (SDNs). We examine the state-
of-the-art and disclose some general issues in Fog computing
including security, privacy, trust, and service migration among
Fog devices and between Fog and Cloud.
FUTURE ENCHANCEMENT
Since fog as itself a newer concept, implanting this will takes a little time but once done, it would make IoT devices a lot smarter.
The extended work on fog computing & cloud computing could be on the impact of heterogeneous storage and overall
performance on the basis of diverse applications.
Fog computing has several advantages over cloud computing. Fog computing can boost usability and accessibility in various
computing environments. Soon, cloud computing for IoT may fade away but fog computing will take over. IoT is seeing an
impressive growth rate and so it needs a special infrastructure base that can handle all its requirements. Fog computing is the key
to accomplish this critical work.
THANK YOU

More Related Content

Similar to FOG COMPUTING, what and why a fog computing

EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 

Similar to FOG COMPUTING, what and why a fog computing (20)

Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 

Recently uploaded

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological universityMohd Saifudeen
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 

Recently uploaded (20)

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 

FOG COMPUTING, what and why a fog computing

  • 2. Whereas the cloud is "up there" in the sky somewhere, distant and remote and deliberately abstracted. The "fog" is close to the ground, right where things are getting done. Just like the cloud, fog computing is expected to open new business models. But what a fog computing is?
  • 3. EXISTING SYSTEM CLOUD COMPUTING In past couple of years, the main idea was given to build mega data center architecture with the demand of centralized computing services called centralize cloud computing (CC) model. Examples of cloud computing are: Google, Amazon, IBM, and Microsoft Azure. Cloud computing has provided many opportunities for enterprises by offering their customer a range of computing services. Current “pay as you go” Cloud computing model becomes an efficient alternative to owning and managing private data centres for customers facing Web Applications.
  • 4. PROBLEMS WITH CLOUD COMPUTING As the Internet of Things grows, businesses face a growing need to analyze data from sources at the edge of a network, whether mobile phones, gateways, or IoT sensors. Cloud computing has a disadvantage: ➢It can’t process data quickly enough for modern business applications. The IoT owes its explosive growth to the connection of physical things and operation technologies (OT) to analytics and machine learning applications, which can help glean insights from device-generated data and enable devices to make “smart” decisions without human intervention. Currently, such resources are mostly being provided by cloud service providers, where the computation and storage capacity exists. ➢ However, despite its power, the cloud model is not applicable to environments where operations are time-critical or internet connectivity is poor. This is especially true in scenarios such as telemedicine and patient care, where milliseconds can have fatal consequences. ➢The same can be said about vehicle to vehicle communications, where the prevention of collisions and accidents can’t afford the latency caused by the roundtrip to the cloud server. “The cloud paradigm is like having your brain command your limbs from miles away — it won’t help you where you need quick reflexes.” ➢Moreover, having every device connected to the cloud and sending raw data over the internet can have privacy, security and legal implications, especially when dealing with sensitive data that is subject to separate regulations in different countries. IoT nodes are closer to the action, but for the moment, they do not have the computing and storage resources to perform analytics and machine learning tasks. Cloud servers, on the other hand, have the horsepower, but are too far away to process data and respond in time.
  • 5. PROPOSED SYSTEM ➢Fog computing or fog networking, also known as fogging, is an architecture that uses edge device to carry out a substantial amount of computation, storage, and communication locally and routed over the Internet backbone. ➢Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Like edge computing, fog computing brings the advantages and power of the cloud closer to where data is created and acted upon. Many people use the terms fog computing and edge computing interchangeably because both involve bringing intelligence and processing closer to where the data is created. This is often done to improve efficiency, though it might also be done for security and compliance reasons. ➢ CISCO recently delivered the vision of fog computing to enable applications on billions of connected devices, already connected in the Internet of Things (IoT), to run directly at the network edge. Customers can develop, manage and run software applications on Cisco IOx framework of networked devices, including hardened routers, switches and IP video cameras. Cisco IOx brings the open source Linux and Cisco IOS network operating system together in a single networked device (initially in routers). Data Centres End-Devices Nodes
  • 7. HOW FOG COMPUTING WORKS Fog networking complements -- doesn't replace -- cloud computing; fogging enables short-term analytics at the edge, while the cloud performs resource-intensive, longer-term analytics. Fog computing uses the concept of ‘fog nodes.’ These fog nodes are located closer to the data source and have higher processing and storage capabilities. Fog nodes can process the data far quicker than sending the request to the cloud for centralized processing. The cloud is getting cluttered due to the enormous number of devices connecting to the internet. Since cloud computing is not viable in some cases, it has become necessary to use fog computing for IoT devices. It can handle the enormous data generated by these devices. When implemented, fog-empowered devices locally analyze time-critical data that includes alarm status, device status, fault warnings, and so on. This minimizes latency and prevents major damage. Fog computing can effectively reduce the amount of bandwidth required, which in turn speeds up the communication with the cloud and various sensors.
  • 8. WHEN TO USE FOG COMPUTING? Fog Computing can be used in the following scenarios: ➢It is used when only selected data is required to send to the cloud. This selected data is chosen for long term storage and is less frequently accessed by the host. ➢It is used whenever a large number of services need to be provided over a large area at different geographical locations. ➢Devices that are subjected to rigorous computations and processing's must use fog computing. ➢Real-world examples where fog computing is used are in IoT devices (e.g. Car-to-Car communication), Devices with Sensors, Cameras (IIoT-Industrial Internet of Things), etc.
  • 9. STEP-BY- STEP FOG COMPUTING PROCESS: Signals are wired from IoT devices to an automation controller which executes a control system program to automate those devices. A control system program wires data through a protocol gateway. Data is converted into a protocol such as HTTP so that it can be understood easily by internet-based services. A fog node collects the data for further analysis. It filters the data and saves it for later use.
  • 10. Cloud Architecture with and without Fog Computing Cloud Architecture before the advent of fog computing Cloud Architecture after the advent of fog computing
  • 11. FOG COMPUTING CHARACTERISTICS 1. Geographical distribution: The services and application objective of the fog is widely distributed. 2. Support for mobility: Fog devices provide mobility techniques like decouple host identity to location identity. 3. Real time interactions: Fog computing requires real time interactions for speedy service. 4. Heterogeneity: Fog nodes can be deployed in a wide variety of environments. 5. Interoperability Fog components must be able to interoperate in order to give wide range of services like streaming. 6. Decentralization: The fog computing architecture is decentralized. There is no central server to manage computing resources and services. Therefore, fog nodes are self-organizing and collaborate to provide end users with real-time IoT applications Save storage space: Fog computing is one of the best options to avoid improper or unrelated data to move to the whole network, thus will save storage space and decrease the latency.
  • 12. ADVANTAGES OF FOG COMPUTING ➢It offers better security. ➢Fog nodes can be protected using same procedures followed in IT environment. ➢It processes selected data locally instead of sending them to the cloud for processing. Hence it can save network bandwidth. This leads to lower operational costs. ➢It reduces latency requirements and hence quick decisions can be made. This helps in avoiding accidents. ➢It offers better privacy to the users data as they are analyzed locally instead of sending them to the cloud. Moreover IT team can manage and control the devices. ➢It is easy to develop fog applications using right tools which can drive machines as per customers need. ➢Fog nodes are mobile in nature. Hence they can join and leave the network at any time. ➢ Fog nodes can withstand harsh environmental conditions in places such as tracks, vehicles, under sea, factory floors etc. Moreover it can be installed in remote locations. ➢ Fog computing offers reduction in latency as data are analyzed locally. This is due to less round trip time and less amount of data bandwidth.
  • 13. DISADVANTAGES OF FOG COMPUTING ➢ Encryption algorithms and security policies make it more difficult for arbitrary devices to exchange data. Any mistakes in security algorithms lead to exposure of data to the hackers. ➢Other security issues are IP address spoofing, man in the middle attacks, wireless network security etc. ➢To achieve high data consistency in the the fog computing is challenging and requires more efforts. ➢Fog computing will realize global storage concept with infinite size and speed of local storage but data management is a challenge. ➢Trust and authentication are major concerns. ➢Scheduling is complex as tasks can be moved between client devices, fog nodes and back end cloud servers. ➢Power consumption is high in fog nodes compare to centralized cloud architecture.
  • 14. Advantages of FOG computing over CLOUD computing: CLOUD COMPUTING FOG COMPUTING Data and applications are processed in a cloud, which is time consuming task for large data. Rather than presenting and working from a centralized cloud, fog operates on network edge. So it consumes less time. Problems of bandwidth, as a result of sending every bit data over cloud computing Less demand of bandwidth, as every bit of data’s were aggregated at certain access point instead of sending over cloud channels Slow response time and scalability problem as a result of depending servers that are located at remote places. By setting small servers called edge servers in visibility of user, it is possible for a fog computing platform to avoid response time and scalability issues
  • 15. CHALLENGES OF FOG COMPUTING ➢Privacy: Privacy concern is always there when there are many networks involved. Since fog computing is based on wireless technology, there is a huge concern regarding network privacy. There are so many fog nodes that each end-user is accessible to them and because of this more sensitive information passes from end-users to the fog nodes. ➢Security: Fog computing security challenge arise as there are many devices connected to fog nodes and at different gateways. Each device has a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog node. ➢Fog Servers: The right placement of fog servers should be there so that it can deliver its maximum service. The company should analyze the demand and work done by the fog node before placing it will help in reducing the maintenance cost. ➢Energy consumption: Energy consumption is very high in fog computing as the number of fog nodes present in the fog environment are high and require energy to work. Companies should try to minimize the energy requirement by the fog nodes so that they should become more energy-efficient and save costs. ➢Delay in Computing: Delays due to Data aggregation, Resource over-usage reduces the effectives of services provided by the fog servers, causing delay in computing data. Data Aggregation should take place before data processing, Resource-limited fog nodes should be designed scheduling by using priority and mobility model.
  • 16. FOG COMPUTING TECHNOLOGY ➢5G Technologies: Fog computing focuses on serving customized location-based applications to mobile users. The Fog layers can be adapted by using the existing accessing networks, e.g., WiFi, or emerging 5G wireless technologies with a virtualized architecture. ➢Network Function Virtualization (NFV): In contrast NFV which targets to enabled virtualized network functions inside network nodes, e.g., switches and routers, Fog computing aims at enabling virtualized location-based applications at the edge device and providing desirable services to localized mobile users. ➢Software-defined Networking (SDN): The Fog computing, as the local surrogate of cloud, needs to synchronize frequently with cloud for data update and support. With a global network view, the cloud can manage the entire network using a SDN approach.
  • 18. Smart health gadgets and devices can receive best services from fog devices at network edge. No need to send service request to cloud server. HEALTHCARE:
  • 19. Fog device enables cars to talk with each other to avoid accidents. It also helps in getting information about low crowded path. CAR COMMUNICATION:
  • 20. Fog computing would be able to obtain sensor data on all the levels, and integrate all the mutually independent network entities within. Smart city:
  • 21. Smart electric devices can switch to other energy sources like solar and winds based on demand for energy, its attainability and low cost. SMART GRID:
  • 22. Lights Fog enables automatic opening of signals based on dynamic situation of traffic signals. Also, it can detect ambulance and open lanes for it. SMART TRAFFIC:
  • 23. All sensors in the building can communicate and exchange with each other and with Fog device. Fog device performs analysis on combined data. Connected devices may react in response to data analysis and distributed decision making. SMART BUILDING Control:
  • 24. CASE STUDEY A REVIEW AND DISCUSSION
  • 25. FOG COMPUTING IN HEALTHCARE CHALLENGES FOR HEALTHCARE: ➢Healthcare system is most countries face enormous challenges that will increase due to aging population and the rise of chronic diseases. ➢Growing nursing staff shortage. ➢Much time wasted in hospitals by manually measuring biometric parameters and transferring the data between systems.
  • 26. REQUIREMENTS OF HEALTHCARE APPLICATIONS BANDWIDTH of at least 20.48 kbit/s and 96 kbit/s. Bandwidth For ECG, latencies of up to 2 to 4 seconds in real-time monitoring are acceptable. Latency some in-body sensors rely on energy-harvesting, either by heat or kinetic energy. some sensors may require an operation of the patient when battery needs replacement. Energy-Efficiency Depending on what data is used for, system failures have different consequences, from minor inconvenience to serious threat to the patients’ lives. Dependability the security requirements in healthcare are high. Security Systems, even when provided by different vendors, should be interoperable with each other. Interoperability system even when provided by the different vendors, should be interoperable with each other.
  • 27. VISION OF FOG COMPUTING IN HEALTHCARE ➢Flexibility of Computation locus: The location can be dynamic and depend on the current context, environment and application requirements. ➢ Integration: Within fog computing architecture, new sensors can be added to the existing infrastructure. • Fog computing can also serve as a compatibility layer to translate between various standards. ➢Patient mobility: Application-specific infrastructure also limits the area where patients can be monitored. • The transitions between different environments can be managed more gradually. ➢New Applications: Fog computing will provide latency and response time improvements, as well as energy savings for wearable and low-cost devices, while performing complex tasks such as fall detection. • Internet of Health care things.
  • 28.
  • 29. Healthcare Application with and without Fog Computing WITHOUT FOG COMPUTING WITH FOG COMPUTING
  • 30. SECURITY ISSUES The main security issues are authentication at different levels of gateways as well as in case of smart grids at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
  • 31. Example: MAN-IN –MIDDLE-ATTACK In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones .
  • 32. CONCLUSION Fog computing advantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs). We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud.
  • 33. FUTURE ENCHANCEMENT Since fog as itself a newer concept, implanting this will takes a little time but once done, it would make IoT devices a lot smarter. The extended work on fog computing & cloud computing could be on the impact of heterogeneous storage and overall performance on the basis of diverse applications. Fog computing has several advantages over cloud computing. Fog computing can boost usability and accessibility in various computing environments. Soon, cloud computing for IoT may fade away but fog computing will take over. IoT is seeing an impressive growth rate and so it needs a special infrastructure base that can handle all its requirements. Fog computing is the key to accomplish this critical work.