The document discusses fog computing as a complement to cloud computing for handling IoT data. It describes fog computing as distributing computing to network edges near IoT devices to overcome limitations of centralized cloud systems. It outlines key aspects of fog including scalability, security, programmability, and low latency. Application examples where fog may provide benefits over cloud are discussed such as connected vehicles, fire detection, and real-time health analytics. Major tech companies are working to advance fog computing standards and technologies.
3. CONTENTS…
Introduction to Fog .
Limitations of cloud.
6 dimensions of fog.
Fog Overcomes Cloud.
Key Pillars Of Fog Computing.
Fog Computing v/s Cloud Computing.
Open Fog Consortium.
3-Tier Architecture Of Fog.
Service Based Working Of Fog.
Security Issues.
Applications.
Future Challenges.
Conclusions.
4. INTRODUCTION TO FOG
It is a technology in
which data, processing
and applications are
concentrated in devices at
the network edge rather
than existing almost
entirely in the cloud.
The term “fogging” was
introduced by CISCO in
2012.
7. Due to increasing number of connected IoT devices, the cloud traffic is
increasing which has posed several challenges and result in the following
limitations of cloud-
12. Fog Overcomes Cloud
• Reduction in data movement across the network
resulting in reduced congestion.
• Elimination of bottlenecks resulting from centralized
computing systems.
• Improved security of encrypted data as it stays closer
to the end user.
13. KEY PILLARS OF FOG COMPUTING
• Scalability
-Virtualization
-Hierarchy of nodes
-Modularity
• Security
-Strong Security
-Fault Tolerance
• Programmability
-Interoperability
-Multiple Application Support
• Real-Time Features
-Deterministic timing capability
14.
15. Requirement
Latency
Delay Jitter
Location of server nodes
Distance between cloud and
server
Security
Attack on routers
Geographical Distribution
No. of server nodes
Support for mobility
Real time interaction
Cloud
computing
High
High
Within internet
Multiple hops
Undefined
High Probability
Centralized
Few
Limited
Supported
Fog
computing
Low
Very low
At the edge of local network
One hop
Can be defined
Very Less Probability
Distributed
Very large
Distributes
Distributed
16. Fog is managed by a consortium
named OPENFOG
The OpenFog Consortium is a consortium of high tech industry
companies and academic institutions across the world aimed at the
standardization and promotion of fog computing in various
capacities and fields.
19. Non time
sensitive
data
Sends the summary for historical analysis
and storage
Action
Sends the
summary for
historical
analysis and
storage
cloud
Nearest
fog
node
Devices Aggregate
fog node
20. ADVANCED ENCRYPTION
ALGOITHM
• Most advanced and secured standard for encryption of electronic
data.
• AES accepts of the key size of 128, 192, 256 bits of size.
• Fast in both software as well as hardware .
24. Connected Vehicles
Real-time interactions
will make
communications
between cars, access
points and traffic
lights as safe and
efficient as possible.
At some point in time,
the connected car will
start saving lives.
Fog computing will be
the best option for all
internet connected
vehicles.
25. Fire Detection and Fighting
It monitors
geographic areas.
The monitoring is
done through the
gathering of
information such as
wind speed,
moisture, and
temperature. When
fire is detected, the
application evaluates
its intensity and
contour and
dispatches the most
appropriate robots to
extinguish it.
26. Real Time Health Analytics
Patient with
chronic illness
can be treated in
real time.
During emergency
respective doctors
will be alerted.
Historical data
analytics can
predict future
changes of the
patient.
27. Smart Cities
Fog computing
allows fast,
machine-to-
machine (M2M)
handshakes and
human to
machine
interactions
(HMI), which
would work in
cooperation with
the cloud.
30. CONCLUSIONS
Fog computing is not a substitute for cloud
computing but a powerful complement.
It solves primary problem faced by cloud while
handling IoT data.
It’s benefits extend from an individual person to
huge firms.
Provides real time analytics and monitoring.
Fog computing also is often erroneously called edge computing, but there are key differences. Fog works with the cloud, whereas edge is defined by the exclusion of cloud. Fog is hierarchical, where edge tends to be limited to a small number of layers. In additional to computation, fog also addresses networking, storage, control and acceleration
Managed by OpenFog Reference Architecture (OpenFog RA)
The number of devices connected to internet has exceeded the world’s population in the year 2010 and at present it is double the world’s population and in the next five years from now it would be about 50 billion of devices connected to the internet.
An actuator is a component of a machine that is responsible for moving or controlling a mechanism or system. An actuator requires a control signal and a source of energy. The control signal is relatively low energy and may be electric voltage or current, pneumatic or hydraulic pressure, or even human power.
Security problems in Cloud.
At present each of the airplane produces around 20 terabytes of data produced in an hour and they need to be stored and retrieved real time.
Cisco predicts that in the next decade, Internet of Things will be at 14.4$ trillion value of stake for companies.
As the number of the devices connected to the internet has been increasing at rapid speed and even advancement in the Internet of Things has led this number to increase drastically. In the future, the world would be full of sensors and there would be huge amount of data produced by these devices and storing data into cloud and retrieving is highly difficult. Hence fog has been introduced.
A virtual machine monitor (VMM) or
hypervisor is computer software, that generates and runs virtual machines. A hypervisor operates one or more
virtual machines on a machine which is known as host machine.
Jitter is the variation in data flow between two systems often caused by network congestion that causes problems with real-time communications
unauthorized access will be notified to the system.
There are still some problems with the existing method leading to hacking and accessing of data in fog. This motivated us to think for encryption of data in the level of fog in cloud system.
Decoy system [7] is being used as current security system for authorization of data. Decoy system is said to be a system of deception in which phony components are setup for enticing of the unauthorized users by giving vulnerabilities of a system thereby restricting unauthorized access to the network.
whenever user requests for the data, the encrypted data travels from cloud to fog and fog to end user and the data will be decrypted at end user.
iCan Cloud: The primary aim of iCanCloud is to report the trade-off between cost and performance on a specific hardware. TOPNET’s is normally specialized for network development and research.
OPNET It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber and the graphical interface is utilized to make the network topology. application and entities from the system application layer to the physical layer. Here, the object oriented programming language is utilized to generate a mapping from the graphical interface for the real implementation OPNET’s is normally specialized for network development and research. It is reliably utilized for communication networks study, about protocols, devices and the applications. As this is commercial service supplier it has a good graphical interface for subscriber.
Cloud Analyst: Cloud Analyst distinguishes the simulation experimentation exercise from a programming exercise. It also enables a simulator to repeatedly do simulations and to carry out a set of simulation experiments with little
parameters variations in a easy and frequent way.
Cloud sim: It is significant to notice that CloudSim is not a ready-to-use solution where you adjust
parameters and gather results for usage in your project. All the CloudSim components interact with each other via
message passing.
Network Cloud : Network Cloud is an extended version of CloudSim and is capable of enforcing network layer in
CloudSim, reads a BRITE file and creates a topological network
OMNET++: OMNeT++ is a public source, a discrete event modeller with GUI support of component based
network modeller. The primary application field of this simulator is the communication networks along with its
reliable architecture it has other areas i.e. hardware architecture, IT systems, queuing network and also in
business mechanism.
Connected car: Autonomous vehicle is the novel trend occurs on the road. Tesla is operating on software to add
automatic steering, enabling literal "hands free" operations of the vehicle. Starting out with releasing and testing selfparking
characteristics that don't need a person behind the wheel [5]. Within 2017 all new cars on the road will have the
ability to link to cars nearby and internet. Fog computing will be the best choice for all internet linked vehicles why
because fog computing provides real time interaction. Cars, traffic lights and access point will be able to communicate
The application is made up of three components: Fire Detector, Firefighting Strategies, and Robots Dispatcher. These three components could be located in a cloud that might be geographically far from IoT devices (i.e., the sensors and the robots). This may cause transmission delays between the IoT devices and the application components. Chances to detect and fight fire in a timely manner might be compromised.
Fig depicts a potential fog system approach to the problem. The Fire Detector and/or the Robot Dispatcher can be moved from the cloud stratum to the fog stratum .Moving either of both of these components to the fog stratum helps to achieve tight end-to-end latency constraint. For example, locating the Fire Detector at the fog stratum allows it to collect real-time data from the sensors and detect if there is fire . This detection can be done in a timely manner, seeing that the fog stratum is closer to the IoT devices.
The cloud computing market for health care is measured to arrive $5.4 billion by 2017, according to
Markets and Markets report and fogging would permit this on a more confined level.
In decentralized smart building control wireless sensors are set up to evaluate
humidity, temperature, or levels of several gaseous components in the building environment. Hence information can be
exchanged between all sensors in the floor and the reading can be mixed to form reliable evaluations. Utilizing
distributed decision building the fog devices react to data. The system prepares to work together to decrease the input
fresh air, temperature and output moisture from the air or increase humidity. Sensors reply to the movements by
switching off or on the lights. Observance of the outlook the fog computing are used for smart buildings which can
manage basic requirements of conserving internal and external energy.
Security
The main security issue is the authentication of the devices involved in fog computing at different
gateways. Each appliance has its own IP address. A malicious user may use a fake IP address to access
information stored on the particular fog node. To overcome this access control an intrusion detection system
has to be applied at all layers of the platform