SlideShare a Scribd company logo
Fog Computing
What, How and Why
by
SHAKEEB AHMAD
SHAIKH ABUZAR
What is it?
• It defines a mix of a traditional centralized data storage system and
Cloud.
• Computing is performed at local networks, although servers
themselves are decentralized.
• The term fog computing was coined by Cisco
• The fog extends the cloud to be closer to the things that produce and
act on IoT data.
Extend the Cloud to Where the Things Are
In technical language
• These devices, called fog nodes, can be deployed anywhere with a
network connection: on a factory floor, on top of a power pole,
alongside a railway track, in a vehicle, or on an oil rig.
• Any device with computing, storage, and network connectivity can be
a fog node.
• Analyzing IoT data close to where it is collected minimizes latency.
• It offloads gigabytes of network traffic from the core network.
• It keeps sensitive data inside the network.
Fog computing vs cloud computing
• The data, therefore, can be accessed offline because some portions of
it are stored locally as well.
• This is the key distinction between fog computing vs cloud computing,
where all the intelligence and computing are performed on remote
servers.
• Rephrased: The main difference between cloud computing and fog
computing is that the former provides centralized access to resources
whereas the latter provides a decentralized local access.
Benefits?
• Low latency
• The fog network can process large volumes of data with little-to-no delay.
• Because a lot of data is stored locally, the computing is performed faster.
• Better data control
• In cloud computing, third-party servers are fully disconnected from local networks, leaving
little to no control over data.
• In fog computing, users can manage a lot of information locally and rely on their security
measures.
• A flexible storage system
• Fog computing doesn’t require constant online access
• The data can be stored locally or pulled up from local drives — such storage combines online
and offline access.
• Connecting centralized and decentralized storage
• Fog computing builds a bridge between local drives and third-party cloud services, allowing a
smooth transition to fully decentralized data storage.
Why do we need it?
• Smart sensors and IoT devices generate immense amount of data, which
would be costly and time-consuming to send to the cloud for processing
and analysis.
• Fog computing reduces
• bandwidth needed
• back-and-forth communication between sensors and the cloud
• which can negatively affect IoT performance
• Although latency may be annoying when sensors are part of a gaming
application, delays in data transmission in many real-world IoT scenarios
can be life-threatening
• Security shortcomings: Existing data protection mechanism in cloud
computing such as encryption failed in securing the data from the attackers
How it works
• Fog computing works by deploying fog nodes throughout your
network.
• Devices from controllers, switches, routers, and video cameras can
act as fog nodes.
• These fog nodes can then be deployed in target areas such as your
office floor or within a vehicle.
• When an IoT device generates data this can then be analyzed via one
of these nodes without having to be sent all the way back to the
cloud.
Working (…continued)
• Transporting data through fog computing has the following steps:
• Signals from IoT devices are wired to an automation controller which then
executes a control system program to automate the devices.
• The control system program sends data through to an OPC server or protocol
gateway.
• The data is then converted into a protocol that can be more easily understood
by internet-based services (Typically this is a protocol like HTTP or MQTT).
• Finally, the data is sent to a fog node or IoT gateway which collects the data
for further analysis. This will filter the data and in some cases save it to hand
over to the cloud later.
Role of cloud in fog computing
• The primary advantage of cloud-based systems is they allow data to be
collected from multiple sites and devices, which is accessible anywhere in
the world.
• Cloud computing is the standard of IoT data storage right now. It’s the form
of computing where data is stored on multiple servers and can be accessed
online from any device. Instead of saving information to the local hard
drive on a single computer, users store it on third-party online servers.
• To access data, a user needs to enter an account associated with the cloud
service. The data undergoes end-to-end encryption, so even service
providers have no access to the user’s contents. For the Internet of Things,
this means securely storing and managing a lot of data and having
immediate access to it from multiple devices, anytime, anywhere.
Edge vs Fog computing
• The key difference between the two lies in where the location of
intelligence and compute power is placed.
• A fog environment places intelligence at the local area network (LAN).
• Edge computing places intelligence and processing power in devices such as
embedded automation controllers.
• Edge computing processes data away from centralized storage,
keeping information on the local parts of the network — edge
devices. When the data is sent to the edge device, it can be processed
directly on it, without being sent to the centralized cloud.
Few insights
• How do fog and edge computing work?
• Fog computing is useful when the Internet connection isn’t always stable. For instance, on
connected trains the fog system can pull up locally stored data on areas where the Internet
connection can’t be maintained.
• How is data processed by fog computing?
• Urgent requests are sent directly to the fog and processed locally in the network;
• Less sensitive data is transferred to the cloud’s main data centers where it’s stored and analyzed;
• Under normal conditions, the majority of data goes to the cloud, local storages are used in
scenarios where saving bandwidth is a priority.
• Fog computing allows to implement data processing at the local networks, especially if it has to
be processed in real time. This is what makes this storage form incredibly stable under stressful
conditions, especially when comparing cloud vs fog computing.
• Edge computing is the least vulnerable form of decentralized storage. On the cloud, data is
distributed to dozens of servers, whereas edge computing uses hundreds, possibly thousands of
local nodes. Each device can act as a server in the edge network. To break into, hackers would
need access to thousands of destributed devices, which is practically impossible.
Use Cases
• Oil and Gas
• Energy and Utilities
• Hospitality
• Retail
• Wearables
• Smart buildings
• Agriculture
• Government
• Military
Limitations
• Physical location – Perhaps the most significant limitation of fog computing is
that it is much more geographically restrictive than a cloud service. A cloud
service can be accessed from anywhere whereas fog computing is used to
interact with devices on a local level. It doesn’t have any centralized access.
• Security – Another key concern is that of security. Fog computing relies on
trusting those close to the edge of the network and the fog nodes to maintain
them and protect them against malicious entities. The lack of visibility of these
systems due to their physical location can leave enterprises open to external
threats.
• Complexity – If you’re using a network with traditional infrastructure, cloud
services, and fog computing, things can get very complex very quickly. All of this
architecture needs to be maintained, and adding a patchwork of these complex
technologies together makes this a very difficult task
Conclusion
• Fog computing makes it easier for the engineers to focus on data and
handling the data instead of designing and maintaining the
architecture.

More Related Content

What's hot

Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
Centric
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
Prakash Honnur
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog Computing
Sabelo Dlamini
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Jiang Zhu
 
Network Presentation
Network PresentationNetwork Presentation
Network Presentation
AkashSingh621666
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
GAURAV SINHA
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
vishal choudhary
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
vishal choudhary
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
pavan penugonda
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
Hadi Fadlallah
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
Leen Blom
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge Computing
Julien SIMON
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
Ahmed Banafa
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
Pawan Arya
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
vishal choudhary
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
Kiran Kumar Pattanaik
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
Kunal Bangar
 

What's hot (20)

FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog Computing
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
 
Network Presentation
Network PresentationNetwork Presentation
Network Presentation
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge Computing
 
Amdlrmo needs
Amdlrmo needsAmdlrmo needs
Amdlrmo needs
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 

Similar to Fog Computing: What, How and Why [Shakeeb A.]

Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
drth5
 
Edge comp
Edge compEdge comp
Edge comp
mahendra665237
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
Prathmeshnawale2
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
Pratik Gohel
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptx
andre241421
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
SachuS16
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
RemoMarconzini1
 
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptxEDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
National Institute of Technolgy(REC) warangal
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
2.pdf
2.pdf2.pdf
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Infosys
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 

Similar to Fog Computing: What, How and Why [Shakeeb A.] (20)

Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge comp
Edge compEdge comp
Edge comp
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptx
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptxEDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
2.pdf
2.pdf2.pdf
2.pdf
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
13778757.ppt
13778757.ppt13778757.ppt
13778757.ppt
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Fog Computing: What, How and Why [Shakeeb A.]

  • 1. Fog Computing What, How and Why by SHAKEEB AHMAD SHAIKH ABUZAR
  • 2. What is it? • It defines a mix of a traditional centralized data storage system and Cloud. • Computing is performed at local networks, although servers themselves are decentralized. • The term fog computing was coined by Cisco • The fog extends the cloud to be closer to the things that produce and act on IoT data.
  • 3. Extend the Cloud to Where the Things Are
  • 4. In technical language • These devices, called fog nodes, can be deployed anywhere with a network connection: on a factory floor, on top of a power pole, alongside a railway track, in a vehicle, or on an oil rig. • Any device with computing, storage, and network connectivity can be a fog node. • Analyzing IoT data close to where it is collected minimizes latency. • It offloads gigabytes of network traffic from the core network. • It keeps sensitive data inside the network.
  • 5. Fog computing vs cloud computing • The data, therefore, can be accessed offline because some portions of it are stored locally as well. • This is the key distinction between fog computing vs cloud computing, where all the intelligence and computing are performed on remote servers. • Rephrased: The main difference between cloud computing and fog computing is that the former provides centralized access to resources whereas the latter provides a decentralized local access.
  • 6. Benefits? • Low latency • The fog network can process large volumes of data with little-to-no delay. • Because a lot of data is stored locally, the computing is performed faster. • Better data control • In cloud computing, third-party servers are fully disconnected from local networks, leaving little to no control over data. • In fog computing, users can manage a lot of information locally and rely on their security measures. • A flexible storage system • Fog computing doesn’t require constant online access • The data can be stored locally or pulled up from local drives — such storage combines online and offline access. • Connecting centralized and decentralized storage • Fog computing builds a bridge between local drives and third-party cloud services, allowing a smooth transition to fully decentralized data storage.
  • 7. Why do we need it? • Smart sensors and IoT devices generate immense amount of data, which would be costly and time-consuming to send to the cloud for processing and analysis. • Fog computing reduces • bandwidth needed • back-and-forth communication between sensors and the cloud • which can negatively affect IoT performance • Although latency may be annoying when sensors are part of a gaming application, delays in data transmission in many real-world IoT scenarios can be life-threatening • Security shortcomings: Existing data protection mechanism in cloud computing such as encryption failed in securing the data from the attackers
  • 8. How it works • Fog computing works by deploying fog nodes throughout your network. • Devices from controllers, switches, routers, and video cameras can act as fog nodes. • These fog nodes can then be deployed in target areas such as your office floor or within a vehicle. • When an IoT device generates data this can then be analyzed via one of these nodes without having to be sent all the way back to the cloud.
  • 9. Working (…continued) • Transporting data through fog computing has the following steps: • Signals from IoT devices are wired to an automation controller which then executes a control system program to automate the devices. • The control system program sends data through to an OPC server or protocol gateway. • The data is then converted into a protocol that can be more easily understood by internet-based services (Typically this is a protocol like HTTP or MQTT). • Finally, the data is sent to a fog node or IoT gateway which collects the data for further analysis. This will filter the data and in some cases save it to hand over to the cloud later.
  • 10.
  • 11. Role of cloud in fog computing • The primary advantage of cloud-based systems is they allow data to be collected from multiple sites and devices, which is accessible anywhere in the world. • Cloud computing is the standard of IoT data storage right now. It’s the form of computing where data is stored on multiple servers and can be accessed online from any device. Instead of saving information to the local hard drive on a single computer, users store it on third-party online servers. • To access data, a user needs to enter an account associated with the cloud service. The data undergoes end-to-end encryption, so even service providers have no access to the user’s contents. For the Internet of Things, this means securely storing and managing a lot of data and having immediate access to it from multiple devices, anytime, anywhere.
  • 12.
  • 13. Edge vs Fog computing • The key difference between the two lies in where the location of intelligence and compute power is placed. • A fog environment places intelligence at the local area network (LAN). • Edge computing places intelligence and processing power in devices such as embedded automation controllers. • Edge computing processes data away from centralized storage, keeping information on the local parts of the network — edge devices. When the data is sent to the edge device, it can be processed directly on it, without being sent to the centralized cloud.
  • 14. Few insights • How do fog and edge computing work? • Fog computing is useful when the Internet connection isn’t always stable. For instance, on connected trains the fog system can pull up locally stored data on areas where the Internet connection can’t be maintained. • How is data processed by fog computing? • Urgent requests are sent directly to the fog and processed locally in the network; • Less sensitive data is transferred to the cloud’s main data centers where it’s stored and analyzed; • Under normal conditions, the majority of data goes to the cloud, local storages are used in scenarios where saving bandwidth is a priority. • Fog computing allows to implement data processing at the local networks, especially if it has to be processed in real time. This is what makes this storage form incredibly stable under stressful conditions, especially when comparing cloud vs fog computing. • Edge computing is the least vulnerable form of decentralized storage. On the cloud, data is distributed to dozens of servers, whereas edge computing uses hundreds, possibly thousands of local nodes. Each device can act as a server in the edge network. To break into, hackers would need access to thousands of destributed devices, which is practically impossible.
  • 15. Use Cases • Oil and Gas • Energy and Utilities • Hospitality • Retail • Wearables • Smart buildings • Agriculture • Government • Military
  • 16. Limitations • Physical location – Perhaps the most significant limitation of fog computing is that it is much more geographically restrictive than a cloud service. A cloud service can be accessed from anywhere whereas fog computing is used to interact with devices on a local level. It doesn’t have any centralized access. • Security – Another key concern is that of security. Fog computing relies on trusting those close to the edge of the network and the fog nodes to maintain them and protect them against malicious entities. The lack of visibility of these systems due to their physical location can leave enterprises open to external threats. • Complexity – If you’re using a network with traditional infrastructure, cloud services, and fog computing, things can get very complex very quickly. All of this architecture needs to be maintained, and adding a patchwork of these complex technologies together makes this a very difficult task
  • 17. Conclusion • Fog computing makes it easier for the engineers to focus on data and handling the data instead of designing and maintaining the architecture.