1. Fog Computing
Submitted By - Nitin Kumar Yadav
Motilal Nehru National Institute of Technology Allahabad
Uttar Pradesh,211004
April 12 , 2018
2. Outline
Introduction
Need of Fog Computing
Architecture of Fog Computing
Sense-Process-Actuate and Stream-Processing Programming
Models
Application of Fog Computing
Six Dimension of Fog Computing
Limitation of Fog Computing
Conclusion
3. Introduction
It’s a Distributed computing paradigm.
Extends the services provided by cloud at the edge of the
network.
It facilitates efficient data processing, analysis, and storage.
As devices communicate peer-to-peer data is managed and
processed at the edge of the network, rather than routing it
through a central data center in the cloud.
Hence, it is also called Edge Computing or fogging. The term
”Fog Computing” was introduced by the Cisco.
4. Need of Fog Computing
Fog Computing was developed to address applications and
services that don’t fit the paradigm of the cloud.
Fog Computing keeps data right where the Internet of Things
needs it.
Existing data protection mechanisms in Cloud Computing such
as encryption failed in securing the data from the attackers.
6. Architecture contd...
Application layer is Heterogeneous in nature here, ranging
from high-speed links to connecting enterprise data centers.
In programming models, a uniform and programmable
interface for seamless resource management and control.
API and Service management discover and use APIs to build
complex functionality.
Multitenent resource management provides generic APIs for
monitoring, provisioning and controlling physical resources
such as CPU, memory, network and energy.
7. Architecture contd...
Fog service provides dynamic, policy-based life-cycle
management of Fog services.
Managing services on a large volume of Fog nodes with a wide
range of capabilities is achieved with the following technology
and components: Foglet Software Agent and Distributed
Database, persistent storage to store policies and resource
meta-data
Policy-Based Services, provides policy-based service routing
i.e., routes an incoming service request to the appropriate
service instance that confirms to the relevant business policies.
8. Sense-Process-Actuate and Stream-Processing
Programming Models
Fog systems generally use the sense-process- actuate and
stream-processing programming models.
Sensors stream data to IoT networks, applications running on
fog devices subscribe to and process the information, and the
obtained insights are translated into actions sent to actuators.
Stream processing is a computer programming paradigm,
equivalent to data flow programming, event stream processing
and reactive programming that allows some applications to
more easily exploit a limited form of parallel processing.
Fog systems dynamically discover and use APIs to build
complex functionality.
9. Application of Fog Computing
Tech giants Cisco and IBM are the driving forces behind fog
computing, and link their concept to the emerging Internet of
Things (IoT).
Most of the buzz around fog has a direct correlation with the
emergence of the Internet of Things (IoT).
Application of Fog Computing are connected cars, smart
grids, smart cities and health care wearable devices.
10. Six Dimensions of Fog Computing
Edge location, location awareness, and low latency : Fog
computing support endpoints with finest services at the edge
of the network.
Geographical distribution : The services and application
objective of the fog is widely distributed.
Support for mobility : Using LISP protocol fog devices provide
mobility techniques like decouple host identity to location
identity.
11. Dimensions Contd...
Real time interactions : fog computing requires real time
interactions for speedy service.
Geographical distribution : The services and application
objective of the fog is widely distributed.Heterogeneity : Fog
nodes can be deployed in a wide variety of environments.
Interoperability : Fog components must be able to
interoperate in order to give wide range of services like
streaming.
12. Limitations of Fog Computing
Existing data protection mechanisms such as encryption was
failed in securing the data from the attackers.
It does not verify whether the user was authorized or not..
Cloud computing security does not focus on ways of secure
the data from unauthorized access.
13. Conclusion
Fog is just an extension to the cloud not the replacement for
cloud.
Using fog we can overcome the limitations of the cloud.
Fog would be the heart for IOT applications in future.
It can process sensitive data locally and other data will go to
cloud for historical analysis.