SlideShare a Scribd company logo
1 of 13
Download to read offline
Fog Computing
Submitted By - Nitin Kumar Yadav
Motilal Nehru National Institute of Technology Allahabad
Uttar Pradesh,211004
April 12 , 2018
Outline
Introduction
Need of Fog Computing
Architecture of Fog Computing
Sense-Process-Actuate and Stream-Processing Programming
Models
Application of Fog Computing
Six Dimension of Fog Computing
Limitation of Fog Computing
Conclusion
Introduction
It’s a Distributed computing paradigm.
Extends the services provided by cloud at the edge of the
network.
It facilitates efficient data processing, analysis, and storage.
As devices communicate peer-to-peer data is managed and
processed at the edge of the network, rather than routing it
through a central data center in the cloud.
Hence, it is also called Edge Computing or fogging. The term
”Fog Computing” was introduced by the Cisco.
Need of Fog Computing
Fog Computing was developed to address applications and
services that don’t fit the paradigm of the cloud.
Fog Computing keeps data right where the Internet of Things
needs it.
Existing data protection mechanisms in Cloud Computing such
as encryption failed in securing the data from the attackers.
Architecture of Fog Computing
Figure: Fog Computing Architecure
Architecture contd...
Application layer is Heterogeneous in nature here, ranging
from high-speed links to connecting enterprise data centers.
In programming models, a uniform and programmable
interface for seamless resource management and control.
API and Service management discover and use APIs to build
complex functionality.
Multitenent resource management provides generic APIs for
monitoring, provisioning and controlling physical resources
such as CPU, memory, network and energy.
Architecture contd...
Fog service provides dynamic, policy-based life-cycle
management of Fog services.
Managing services on a large volume of Fog nodes with a wide
range of capabilities is achieved with the following technology
and components: Foglet Software Agent and Distributed
Database, persistent storage to store policies and resource
meta-data
Policy-Based Services, provides policy-based service routing
i.e., routes an incoming service request to the appropriate
service instance that confirms to the relevant business policies.
Sense-Process-Actuate and Stream-Processing
Programming Models
Fog systems generally use the sense-process- actuate and
stream-processing programming models.
Sensors stream data to IoT networks, applications running on
fog devices subscribe to and process the information, and the
obtained insights are translated into actions sent to actuators.
Stream processing is a computer programming paradigm,
equivalent to data flow programming, event stream processing
and reactive programming that allows some applications to
more easily exploit a limited form of parallel processing.
Fog systems dynamically discover and use APIs to build
complex functionality.
Application of Fog Computing
Tech giants Cisco and IBM are the driving forces behind fog
computing, and link their concept to the emerging Internet of
Things (IoT).
Most of the buzz around fog has a direct correlation with the
emergence of the Internet of Things (IoT).
Application of Fog Computing are connected cars, smart
grids, smart cities and health care wearable devices.
Six Dimensions of Fog Computing
Edge location, location awareness, and low latency : Fog
computing support endpoints with finest services at the edge
of the network.
Geographical distribution : The services and application
objective of the fog is widely distributed.
Support for mobility : Using LISP protocol fog devices provide
mobility techniques like decouple host identity to location
identity.
Dimensions Contd...
Real time interactions : fog computing requires real time
interactions for speedy service.
Geographical distribution : The services and application
objective of the fog is widely distributed.Heterogeneity : Fog
nodes can be deployed in a wide variety of environments.
Interoperability : Fog components must be able to
interoperate in order to give wide range of services like
streaming.
Limitations of Fog Computing
Existing data protection mechanisms such as encryption was
failed in securing the data from the attackers.
It does not verify whether the user was authorized or not..
Cloud computing security does not focus on ways of secure
the data from unauthorized access.
Conclusion
Fog is just an extension to the cloud not the replacement for
cloud.
Using fog we can overcome the limitations of the cloud.
Fog would be the heart for IOT applications in future.
It can process sensitive data locally and other data will go to
cloud for historical analysis.

More Related Content

What's hot

Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog ComputingEr. Ajay Sirsat
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
6g wireless communication systems
6g wireless communication systems6g wireless communication systems
6g wireless communication systemsSAIALEKHYACHITTURI
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouMegan O'Keefe
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesJason TC HOU (侯宗成)
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Simplilearn
 

What's hot (20)

Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
6g wireless communication systems
6g wireless communication systems6g wireless communication systems
6g wireless communication systems
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 
Grid computing
Grid computingGrid computing
Grid computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 

Similar to fog&Edge computing

Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingShivangi Bali
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelAhmed Banafa
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 

Similar to fog&Edge computing (20)

Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Seminar report
Seminar reportSeminar report
Seminar report
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
Fog ppt
Fog pptFog ppt
Fog ppt
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

fog&Edge computing

  • 1. Fog Computing Submitted By - Nitin Kumar Yadav Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh,211004 April 12 , 2018
  • 2. Outline Introduction Need of Fog Computing Architecture of Fog Computing Sense-Process-Actuate and Stream-Processing Programming Models Application of Fog Computing Six Dimension of Fog Computing Limitation of Fog Computing Conclusion
  • 3. Introduction It’s a Distributed computing paradigm. Extends the services provided by cloud at the edge of the network. It facilitates efficient data processing, analysis, and storage. As devices communicate peer-to-peer data is managed and processed at the edge of the network, rather than routing it through a central data center in the cloud. Hence, it is also called Edge Computing or fogging. The term ”Fog Computing” was introduced by the Cisco.
  • 4. Need of Fog Computing Fog Computing was developed to address applications and services that don’t fit the paradigm of the cloud. Fog Computing keeps data right where the Internet of Things needs it. Existing data protection mechanisms in Cloud Computing such as encryption failed in securing the data from the attackers.
  • 5. Architecture of Fog Computing Figure: Fog Computing Architecure
  • 6. Architecture contd... Application layer is Heterogeneous in nature here, ranging from high-speed links to connecting enterprise data centers. In programming models, a uniform and programmable interface for seamless resource management and control. API and Service management discover and use APIs to build complex functionality. Multitenent resource management provides generic APIs for monitoring, provisioning and controlling physical resources such as CPU, memory, network and energy.
  • 7. Architecture contd... Fog service provides dynamic, policy-based life-cycle management of Fog services. Managing services on a large volume of Fog nodes with a wide range of capabilities is achieved with the following technology and components: Foglet Software Agent and Distributed Database, persistent storage to store policies and resource meta-data Policy-Based Services, provides policy-based service routing i.e., routes an incoming service request to the appropriate service instance that confirms to the relevant business policies.
  • 8. Sense-Process-Actuate and Stream-Processing Programming Models Fog systems generally use the sense-process- actuate and stream-processing programming models. Sensors stream data to IoT networks, applications running on fog devices subscribe to and process the information, and the obtained insights are translated into actions sent to actuators. Stream processing is a computer programming paradigm, equivalent to data flow programming, event stream processing and reactive programming that allows some applications to more easily exploit a limited form of parallel processing. Fog systems dynamically discover and use APIs to build complex functionality.
  • 9. Application of Fog Computing Tech giants Cisco and IBM are the driving forces behind fog computing, and link their concept to the emerging Internet of Things (IoT). Most of the buzz around fog has a direct correlation with the emergence of the Internet of Things (IoT). Application of Fog Computing are connected cars, smart grids, smart cities and health care wearable devices.
  • 10. Six Dimensions of Fog Computing Edge location, location awareness, and low latency : Fog computing support endpoints with finest services at the edge of the network. Geographical distribution : The services and application objective of the fog is widely distributed. Support for mobility : Using LISP protocol fog devices provide mobility techniques like decouple host identity to location identity.
  • 11. Dimensions Contd... Real time interactions : fog computing requires real time interactions for speedy service. Geographical distribution : The services and application objective of the fog is widely distributed.Heterogeneity : Fog nodes can be deployed in a wide variety of environments. Interoperability : Fog components must be able to interoperate in order to give wide range of services like streaming.
  • 12. Limitations of Fog Computing Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. It does not verify whether the user was authorized or not.. Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 13. Conclusion Fog is just an extension to the cloud not the replacement for cloud. Using fog we can overcome the limitations of the cloud. Fog would be the heart for IOT applications in future. It can process sensitive data locally and other data will go to cloud for historical analysis.