SlideShare a Scribd company logo
1 of 34
Master of Computer Applications
(Semester III )
FACULTY OF SCIENCE
CS-501 - Technical Writing
A platform for IoT And Cloud
CONTENTS…
Introduction to Fog .
Limitations of cloud.
6 dimensions of fog.
Fog Overcomes Cloud.
Key Pillars Of Fog Computing.
Fog Computing v/s Cloud Computing.
Open Fog Consortium.
3-Tier Architecture Of Fog.
Service Based Working Of Fog.
Security Issues.
Applications.
Future Challenges.
Conclusions.
INTRODUCTION TO FOG
It is a technology in
which data, processing
and applications are
concentrated in devices at
the network edge rather
than existing almost
entirely in the cloud.
The term “fogging” was
introduced by CISCO in
2012.
SITUATION BEFORE FOG
Due to increasing number of connected IoT devices, the cloud traffic is
increasing which has posed several challenges and result in the following
limitations of cloud-
NETWORK CONGESTION
Security Issues With Cloud
Fog Overcomes Cloud
• Reduction in data movement across the network
resulting in reduced congestion.
• Elimination of bottlenecks resulting from centralized
computing systems.
• Improved security of encrypted data as it stays closer
to the end user.
KEY PILLARS OF FOG COMPUTING
• Scalability
-Virtualization
-Hierarchy of nodes
-Modularity
• Security
-Strong Security
-Fault Tolerance
• Programmability
-Interoperability
-Multiple Application Support
• Real-Time Features
-Deterministic timing capability
Requirement
Latency
Delay Jitter
Location of server nodes
Distance between cloud and
server
Security
Attack on routers
Geographical Distribution
No. of server nodes
Support for mobility
Real time interaction
Cloud
computing
High
High
Within internet
Multiple hops
Undefined
High Probability
Centralized
Few
Limited
Supported
Fog
computing
Low
Very low
At the edge of local network
One hop
Can be defined
Very Less Probability
Distributed
Very large
Distributes
Distributed
Fog is managed by a consortium
named OPENFOG
The OpenFog Consortium is a consortium of high tech industry
companies and academic institutions across the world aimed at the
standardization and promotion of fog computing in various
capacities and fields.
3 Tier Architecture Of Fog
Categorization
Of Data
Extremely Time
Sensitive Data
Less time
Sensitive Data
Non Time-
Sensitive Data
Non time
sensitive
data
Sends the summary for historical analysis
and storage
Action
Sends the
summary for
historical
analysis and
storage
cloud
Nearest
fog
node
Devices Aggregate
fog node
ADVANCED ENCRYPTION
ALGOITHM
• Most advanced and secured standard for encryption of electronic
data.
• AES accepts of the key size of 128, 192, 256 bits of size.
• Fast in both software as well as hardware .
FOG SIMULATION TOOLS
• iCanCloud
• OPNET
• Cloud Analyst
• iFogSim
• Network Cloud
• Network
Simulator 2
(NS2)
• OMNeT++
Connected Vehicles
Real-time interactions
will make
communications
between cars, access
points and traffic
lights as safe and
efficient as possible.
At some point in time,
the connected car will
start saving lives.
Fog computing will be
the best option for all
internet connected
vehicles.
Fire Detection and Fighting
It monitors
geographic areas.
The monitoring is
done through the
gathering of
information such as
wind speed,
moisture, and
temperature. When
fire is detected, the
application evaluates
its intensity and
contour and
dispatches the most
appropriate robots to
extinguish it.
Real Time Health Analytics
Patient with
chronic illness
can be treated in
real time.
During emergency
respective doctors
will be alerted.
Historical data
analytics can
predict future
changes of the
patient.
Smart Cities
Fog computing
allows fast,
machine-to-
machine (M2M)
handshakes and
human to
machine
interactions
(HMI), which
would work in
cooperation with
the cloud.
TECH GIANTS WORKING ON FOG
CONCLUSIONS
 Fog computing is not a substitute for cloud
computing but a powerful complement.
It solves primary problem faced by cloud while
handling IoT data.
It’s benefits extend from an individual person to
huge firms.
Provides real time analytics and monitoring.
The Future Of IoT Lies
In
REFERENCES
www.fogcongress.com
www.grandresearchstore.com
www.nptel.com
www.fogcomputingexpo.com
www.wikipedia.org
www.openfogconsortium.org
www.slideshare.net
Fog Computing Overcomes Cloud Limitations for IoT

More Related Content

What's hot

fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
Schneider Electric Data Center Reference Designs
Schneider Electric Data Center Reference DesignsSchneider Electric Data Center Reference Designs
Schneider Electric Data Center Reference DesignsSchneider Electric
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation Assem mousa
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.sindhuRashmi1
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 

What's hot (20)

Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IoT - module 4
IoT - module 4IoT - module 4
IoT - module 4
 
Fog computing
Fog computingFog computing
Fog computing
 
Schneider Electric Data Center Reference Designs
Schneider Electric Data Center Reference DesignsSchneider Electric Data Center Reference Designs
Schneider Electric Data Center Reference Designs
 
Fog computing
Fog computingFog computing
Fog computing
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 

Similar to Fog Computing Overcomes Cloud Limitations for IoT

FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingShivangi Bali
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 

Similar to Fog Computing Overcomes Cloud Limitations for IoT (20)

FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Fog computing
Fog computingFog computing
Fog computing
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Seminar report
Seminar reportSeminar report
Seminar report
 
FG2.pptx
FG2.pptxFG2.pptx
FG2.pptx
 
Fog security
Fog securityFog security
Fog security
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Fog Computing Overcomes Cloud Limitations for IoT

  • 1. Master of Computer Applications (Semester III ) FACULTY OF SCIENCE CS-501 - Technical Writing
  • 2. A platform for IoT And Cloud
  • 3. CONTENTS… Introduction to Fog . Limitations of cloud. 6 dimensions of fog. Fog Overcomes Cloud. Key Pillars Of Fog Computing. Fog Computing v/s Cloud Computing. Open Fog Consortium. 3-Tier Architecture Of Fog. Service Based Working Of Fog. Security Issues. Applications. Future Challenges. Conclusions.
  • 4. INTRODUCTION TO FOG It is a technology in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. The term “fogging” was introduced by CISCO in 2012.
  • 5.
  • 7. Due to increasing number of connected IoT devices, the cloud traffic is increasing which has posed several challenges and result in the following limitations of cloud-
  • 9.
  • 11.
  • 12. Fog Overcomes Cloud • Reduction in data movement across the network resulting in reduced congestion. • Elimination of bottlenecks resulting from centralized computing systems. • Improved security of encrypted data as it stays closer to the end user.
  • 13. KEY PILLARS OF FOG COMPUTING • Scalability -Virtualization -Hierarchy of nodes -Modularity • Security -Strong Security -Fault Tolerance • Programmability -Interoperability -Multiple Application Support • Real-Time Features -Deterministic timing capability
  • 14.
  • 15. Requirement Latency Delay Jitter Location of server nodes Distance between cloud and server Security Attack on routers Geographical Distribution No. of server nodes Support for mobility Real time interaction Cloud computing High High Within internet Multiple hops Undefined High Probability Centralized Few Limited Supported Fog computing Low Very low At the edge of local network One hop Can be defined Very Less Probability Distributed Very large Distributes Distributed
  • 16. Fog is managed by a consortium named OPENFOG The OpenFog Consortium is a consortium of high tech industry companies and academic institutions across the world aimed at the standardization and promotion of fog computing in various capacities and fields.
  • 18. Categorization Of Data Extremely Time Sensitive Data Less time Sensitive Data Non Time- Sensitive Data
  • 19. Non time sensitive data Sends the summary for historical analysis and storage Action Sends the summary for historical analysis and storage cloud Nearest fog node Devices Aggregate fog node
  • 20. ADVANCED ENCRYPTION ALGOITHM • Most advanced and secured standard for encryption of electronic data. • AES accepts of the key size of 128, 192, 256 bits of size. • Fast in both software as well as hardware .
  • 21.
  • 22. FOG SIMULATION TOOLS • iCanCloud • OPNET • Cloud Analyst • iFogSim • Network Cloud • Network Simulator 2 (NS2) • OMNeT++
  • 23.
  • 24. Connected Vehicles Real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible. At some point in time, the connected car will start saving lives. Fog computing will be the best option for all internet connected vehicles.
  • 25. Fire Detection and Fighting It monitors geographic areas. The monitoring is done through the gathering of information such as wind speed, moisture, and temperature. When fire is detected, the application evaluates its intensity and contour and dispatches the most appropriate robots to extinguish it.
  • 26. Real Time Health Analytics Patient with chronic illness can be treated in real time. During emergency respective doctors will be alerted. Historical data analytics can predict future changes of the patient.
  • 27. Smart Cities Fog computing allows fast, machine-to- machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud.
  • 28.
  • 30. CONCLUSIONS  Fog computing is not a substitute for cloud computing but a powerful complement. It solves primary problem faced by cloud while handling IoT data. It’s benefits extend from an individual person to huge firms. Provides real time analytics and monitoring.
  • 31. The Future Of IoT Lies In
  • 32.

Editor's Notes

  1. Fog computing also is often erroneously called edge computing, but there are key differences. Fog works with the cloud, whereas edge is defined by the exclusion of cloud. Fog is hierarchical, where edge tends to be limited to a small number of layers. In additional to computation, fog also addresses networking, storage, control and acceleration
  2. Managed by OpenFog Reference Architecture (OpenFog RA)
  3. The number of devices connected to internet has exceeded the world’s population in the year 2010 and at present it is double the world’s population and in the next five years from now it would be about 50 billion of devices connected to the internet.
  4. An actuator is a component of a machine that is responsible for moving or controlling a mechanism or system. An actuator requires a control signal and a source of energy. The control signal is relatively low energy and may be electric voltage or current, pneumatic or hydraulic pressure, or even human power.
  5. Security problems in Cloud. At present each of the airplane produces around 20 terabytes of data produced in an hour and they need to be stored and retrieved real time. Cisco predicts that in the next decade, Internet of Things will be at 14.4$ trillion value of stake for companies.
  6. As the number of the devices connected to the internet has been increasing at rapid speed and even advancement in the Internet of Things has led this number to increase drastically. In the future, the world would be full of sensors and there would be huge amount of data produced by these devices and storing data into cloud and retrieving is highly difficult. Hence fog has been introduced.
  7. A virtual machine monitor (VMM) or hypervisor is computer software, that generates and runs virtual machines. A hypervisor operates one or more virtual machines on a machine which is known as host machine.
  8. Jitter is the variation in data flow between two systems often caused by network congestion that causes problems with real-time communications unauthorized access will be notified to the system. There are still some problems with the existing method leading to hacking and accessing of data in fog. This motivated us to think for encryption of data in the level of fog in cloud system. Decoy system [7] is being used as current security system for authorization of data. Decoy system is said to be a system of deception in which phony components are setup for enticing of the unauthorized users by giving vulnerabilities of a system thereby restricting unauthorized access to the network.
  9. whenever user requests for the data, the encrypted data travels from cloud to fog and fog to end user and the data will be decrypted at end user.
  10. iCan Cloud: The primary aim of iCanCloud is to report the trade-off between cost and performance on a specific hardware. TOPNET’s is normally specialized for network development and research. OPNET It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber and the graphical interface is utilized to make the network topology. application and entities from the system application layer to the physical layer. Here, the object oriented programming language is utilized to generate a mapping from the graphical interface for the real implementation OPNET’s is normally specialized for network development and research. It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber. Cloud Analyst: Cloud Analyst distinguishes the simulation experimentation exercise from a programming exercise. It also enables a simulator to repeatedly do simulations and to carry out a set of simulation experiments with little parameters variations in a easy and frequent way. Cloud sim: It is significant to notice that CloudSim is not a ready-to-use solution where you adjust parameters and gather results for usage in your project. All the CloudSim components interact with each other via message passing. Network Cloud : Network Cloud is an extended version of CloudSim and is capable of enforcing network layer in CloudSim, reads a BRITE file and creates a topological network OMNET++: OMNeT++ is a public source, a discrete event modeller with GUI support of component based network modeller. The primary application field of this simulator is the communication networks along with its reliable architecture it has other areas i.e. hardware architecture, IT systems, queuing network and also in business mechanism.
  11. Connected car: Autonomous vehicle is the novel trend occurs on the road. Tesla is operating on software to add automatic steering, enabling literal "hands free" operations of the vehicle. Starting out with releasing and testing selfparking characteristics that don't need a person behind the wheel [5]. Within 2017 all new cars on the road will have the ability to link to cars nearby and internet. Fog computing will be the best choice for all internet linked vehicles why because fog computing provides real time interaction. Cars, traffic lights and access point will be able to communicate
  12. The application is made up of three components: Fire Detector, Firefighting Strategies, and Robots Dispatcher. These three components could be located in a cloud that might be geographically far from IoT devices (i.e., the sensors and the robots). This may cause transmission delays between the IoT devices and the application components. Chances to detect and fight fire in a timely manner might be compromised. Fig depicts a potential fog system approach to the problem. The Fire Detector and/or the Robot Dispatcher can be moved from the cloud stratum to the fog stratum .Moving either of both of these components to the fog stratum helps to achieve tight end-to-end latency constraint. For example, locating the Fire Detector at the fog stratum allows it to collect real-time data from the sensors and detect if there is fire . This detection can be done in a timely manner, seeing that the fog stratum is closer to the IoT devices.
  13. The cloud computing market for health care is measured to arrive $5.4 billion by 2017, according to Markets and Markets report and fogging would permit this on a more confined level.
  14. In decentralized smart building control wireless sensors are set up to evaluate humidity, temperature, or levels of several gaseous components in the building environment. Hence information can be exchanged between all sensors in the floor and the reading can be mixed to form reliable evaluations. Utilizing distributed decision building the fog devices react to data. The system prepares to work together to decrease the input fresh air, temperature and output moisture from the air or increase humidity. Sensors reply to the movements by switching off or on the lights. Observance of the outlook the fog computing are used for smart buildings which can manage basic requirements of conserving internal and external energy.
  15. Security The main security issue is the authentication of the devices involved in fog computing at different gateways. Each appliance has its own IP address. A malicious user may use a fake IP address to access information stored on the particular fog node. To overcome this access control an intrusion detection system has to be applied at all layers of the platform