SlideShare a Scribd company logo
Fog Computing
Under the guidance of:
Prof. V. S. Bhonkar
Presented by:
Miss Chaitali Gajanan Panvalkar
Roll no.:2201955
PRN no.:2030408246001
Institute of Petrochemical Engineering
Department of Information Technology
Dr. Babasaheb Ambedkar Technological University
Seminar on
Index
o What is IoT and Cloud ?
o Fog computing
o Limitations overcome from cloud
o Limitations overcome in fog
o Characteristics of fog computing
o Fog computing architecture
o How fog computing works ?
o Features of fog computing
o Advantages of fog computing
o Limitations of fog computing
o Why fog computing ?
o When to use fog computing ?
o Applications
o Conclusion
o Future scope
o References
What is IoT and Cloud ?
o Cloud Computing is defined as storing and accessing of data and computing
services over the internet.
o The Internet of Things can be described as connecting everyday objects to the
internet.
o IoT applications generate a large amount of data. Transferring this data to the cloud
leads to a number of issues/challenges.
o To overcome these challenges, faced by IoT applications, in the cloud environment,
the term fog computing was introduced by Cisco in the year 2012.
Fog Computing
It is also known as fogging/edge computing.
It is a decentralized computing infrastructure in which data, compute, storage and
applications are located somewhere between the data source and the cloud.
Rather than sending all of data to cloud-based servers to be processed, many of these
devices will create large amounts of raw data and then it will get forwarded to reduce
bandwidth.
Fog is nothing but cloud near end user.
Limitations overcome from cloud
Vulnerability
Depends on internet connection
The level of security
1
3
5
Power consumption
7
High latency
2
4
6
8 Low connection
Technical problem
Downtimes
Limitations overcome in Fog Computing
A lack of centralized processing power.
The ability to process data in real-time.
Increased distributed storage capacity with fog computing.
The ability to adapt more quickly than cloud computing when an outage occurs.
The ability to work better with IoT devices and big data sets.
Data Locality.
Faster Processing of data and power consumption.
Charcteristics of Fog Computing
Geographical
distribution
Real-time
interaction
Close to the end
user
Edge location
Massive sensor
networks
Fog Computing Architecture
The hierarchical fog architecture comprises of following three layers:
1. Terminal Layer
o This layer includes devices like mobile phones, sensors, smart vehicles, readers,
smartcards, etc.
o Devices are distributed across a number of locations separated far apart from each
other.
o The layer mostly deals with data sensing and capturing.
2. Fog Layer
o Fog layer includes devices like routers, gateways, access points, base stations,
specific fog servers, etc., called as Fog nodes.
o Fog nodes are located at the edge of a network. The Fog nodes are situated in-
between end devices and cloud data centers.
o Fog nodes can compute, transfer and store the data temporarily.
3. Cloud Layer
o This layer consists of devices that can provide large storage and machines (servers)
with high performance.
o The data centers are both scalable and provide compute resources on-demand basis.
o It acts as a back-up as well as provides permanent storage for data in a fog
architecture.
Terminal layer
Fog layer
Cloud layer
How Fog Computing works ?
4. Data is analyzed
locally, filtered, and
then sent to the
cloud for long-term
storage if necessary.
1.Works by
utilizing fog nodes
and edge devices.
3. This data is
sent to a fog
node close to the
data source.
2. Raw data is
captured by IoT
beacons.
1
Features of Fog
2 3 4
Aims to place the
data close to the
end user.
Enhance the cloud
experience.
Big data and
analytics can be
done faster with
better results.
Administrators are
able to support
location based
mobility demands.
Advantages of Fog Computing
Productivity
Privacy
Bandwidth
Security
Latency
Fog
computing
Limitations of Fog Computing
Complexity Security Maintenance
Why Fog Computing ?
Reduction of
network traffic
Suitable for
IOT tasks and
Quries
Scalability
Low Latency
requirement
Monitoring
Raw data
management
Resource
Provisioning
When to use Fog Computing ?
1
2
3
4
When only selected data is required to
send to the cloud.
When the data should be analyzed within a
fraction of seconds.
whenever a large number of services need to
be provided over a large area at different
geographical locations.
Devices that are subjected to rigorous
computations and processing’s.
Use
Applications of Fog Computing
Linked vehicles
Real-time analytics
Smart Grids and Smart
Cities:
Connected cars
o Fog computing is ideal for connected
vehicles (CV) because real-time interactions.
o The connected car will start saving lives by
reducing automobile accidents.
Decentralized smart building control
o Wireless sensors are installed to measure temperature,
humidity, or levels of various gaseous components in the
building atmosphere.
o Information can be exchanged among all sensors in the
floor.
Smart cities
o Fog computing would be able to obtain
sensor data on all levels, and integrate
all the mutually independent network
entities within.
Conclusion
o The key advantages of fog computing are greater comparing to cloud
computing.
o Fog provides unprecedented levels of security in the cloud and in social
networks.
o The usage of fog computing can accelerate the innovation process in ways
that has never been seen before.
Future Scope
Fog computing is the future for organizations. It has several
advantages over cloud computing.
Cloud computing for IoT may fade away but fog computing will
take over.
Fog computing is the key to accomplish this critical work. It can
boost usability and accessibility in various computing environments
Any Questions ?
THANK YOU
References
1. Bonomi, Flavio (September 19–23, 2011). "Connected Vehicles, the Internet of Things,
and Fog Computing, The 8th ACM International Workshop on VehiculAr Inter-
NETworking (VANET 2011), Las Vegas, NV, USA". www.sigmobile.org.
Retrieved 2019-08-07.
2. "What Is Fog Computing? Webopedia Definition". www.webopedia.com.
Retrieved 2017-04-07.
3. Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. Fog Computing and its Role in the
Internet of Things. In Proc of MCC (2012), pp. 13-16.[4].
4. "Fog brings the cloud closer to the ground: Cisco innovates in fog
computing". newsroom.cisco.com. Retrieved 2019-01-24.

More Related Content

Similar to semppt.pptx

A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
IJERA Editor
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
Rahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
fog computing
fog computingfog computing
fog computing
AMITTRIPATHI182
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
pranjali rawke
 
Fog security
Fog securityFog security
Fog security
HarshitParkar6677
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
Ahmed Banafa
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
suthi
 
Cloud and Edge Computing Systems
Cloud and Edge Computing SystemsCloud and Edge Computing Systems
Cloud and Edge Computing Systems
Sayed Chhattan Shah
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
Prankit Mishra
 

Similar to semppt.pptx (20)

A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing
fog computingfog computing
fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Fog security
Fog securityFog security
Fog security
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Cloud and Edge Computing Systems
Cloud and Edge Computing SystemsCloud and Edge Computing Systems
Cloud and Edge Computing Systems
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 

Recently uploaded

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

semppt.pptx

  • 1. Fog Computing Under the guidance of: Prof. V. S. Bhonkar Presented by: Miss Chaitali Gajanan Panvalkar Roll no.:2201955 PRN no.:2030408246001 Institute of Petrochemical Engineering Department of Information Technology Dr. Babasaheb Ambedkar Technological University Seminar on
  • 2. Index o What is IoT and Cloud ? o Fog computing o Limitations overcome from cloud o Limitations overcome in fog o Characteristics of fog computing o Fog computing architecture o How fog computing works ? o Features of fog computing o Advantages of fog computing o Limitations of fog computing o Why fog computing ? o When to use fog computing ? o Applications o Conclusion o Future scope o References
  • 3. What is IoT and Cloud ? o Cloud Computing is defined as storing and accessing of data and computing services over the internet. o The Internet of Things can be described as connecting everyday objects to the internet. o IoT applications generate a large amount of data. Transferring this data to the cloud leads to a number of issues/challenges. o To overcome these challenges, faced by IoT applications, in the cloud environment, the term fog computing was introduced by Cisco in the year 2012.
  • 4. Fog Computing It is also known as fogging/edge computing. It is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Rather than sending all of data to cloud-based servers to be processed, many of these devices will create large amounts of raw data and then it will get forwarded to reduce bandwidth. Fog is nothing but cloud near end user.
  • 5. Limitations overcome from cloud Vulnerability Depends on internet connection The level of security 1 3 5 Power consumption 7 High latency 2 4 6 8 Low connection Technical problem Downtimes
  • 6. Limitations overcome in Fog Computing A lack of centralized processing power. The ability to process data in real-time. Increased distributed storage capacity with fog computing. The ability to adapt more quickly than cloud computing when an outage occurs. The ability to work better with IoT devices and big data sets. Data Locality. Faster Processing of data and power consumption.
  • 7. Charcteristics of Fog Computing Geographical distribution Real-time interaction Close to the end user Edge location Massive sensor networks
  • 8. Fog Computing Architecture The hierarchical fog architecture comprises of following three layers: 1. Terminal Layer o This layer includes devices like mobile phones, sensors, smart vehicles, readers, smartcards, etc. o Devices are distributed across a number of locations separated far apart from each other. o The layer mostly deals with data sensing and capturing.
  • 9. 2. Fog Layer o Fog layer includes devices like routers, gateways, access points, base stations, specific fog servers, etc., called as Fog nodes. o Fog nodes are located at the edge of a network. The Fog nodes are situated in- between end devices and cloud data centers. o Fog nodes can compute, transfer and store the data temporarily.
  • 10. 3. Cloud Layer o This layer consists of devices that can provide large storage and machines (servers) with high performance. o The data centers are both scalable and provide compute resources on-demand basis. o It acts as a back-up as well as provides permanent storage for data in a fog architecture.
  • 12. How Fog Computing works ? 4. Data is analyzed locally, filtered, and then sent to the cloud for long-term storage if necessary. 1.Works by utilizing fog nodes and edge devices. 3. This data is sent to a fog node close to the data source. 2. Raw data is captured by IoT beacons.
  • 13. 1 Features of Fog 2 3 4 Aims to place the data close to the end user. Enhance the cloud experience. Big data and analytics can be done faster with better results. Administrators are able to support location based mobility demands.
  • 14. Advantages of Fog Computing Productivity Privacy Bandwidth Security Latency Fog computing
  • 15. Limitations of Fog Computing Complexity Security Maintenance
  • 16. Why Fog Computing ? Reduction of network traffic Suitable for IOT tasks and Quries Scalability Low Latency requirement Monitoring Raw data management Resource Provisioning
  • 17. When to use Fog Computing ? 1 2 3 4 When only selected data is required to send to the cloud. When the data should be analyzed within a fraction of seconds. whenever a large number of services need to be provided over a large area at different geographical locations. Devices that are subjected to rigorous computations and processing’s. Use
  • 18. Applications of Fog Computing Linked vehicles Real-time analytics Smart Grids and Smart Cities:
  • 19. Connected cars o Fog computing is ideal for connected vehicles (CV) because real-time interactions. o The connected car will start saving lives by reducing automobile accidents.
  • 20. Decentralized smart building control o Wireless sensors are installed to measure temperature, humidity, or levels of various gaseous components in the building atmosphere. o Information can be exchanged among all sensors in the floor.
  • 21. Smart cities o Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within.
  • 22. Conclusion o The key advantages of fog computing are greater comparing to cloud computing. o Fog provides unprecedented levels of security in the cloud and in social networks. o The usage of fog computing can accelerate the innovation process in ways that has never been seen before.
  • 23. Future Scope Fog computing is the future for organizations. It has several advantages over cloud computing. Cloud computing for IoT may fade away but fog computing will take over. Fog computing is the key to accomplish this critical work. It can boost usability and accessibility in various computing environments
  • 26. References 1. Bonomi, Flavio (September 19–23, 2011). "Connected Vehicles, the Internet of Things, and Fog Computing, The 8th ACM International Workshop on VehiculAr Inter- NETworking (VANET 2011), Las Vegas, NV, USA". www.sigmobile.org. Retrieved 2019-08-07. 2. "What Is Fog Computing? Webopedia Definition". www.webopedia.com. Retrieved 2017-04-07. 3. Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. Fog Computing and its Role in the Internet of Things. In Proc of MCC (2012), pp. 13-16.[4]. 4. "Fog brings the cloud closer to the ground: Cisco innovates in fog computing". newsroom.cisco.com. Retrieved 2019-01-24.

Editor's Notes

  1. It offers better security. Fog nodes are mobile in nature. Hence they can join and left the network at any time. It is easy to develop fog applications using the right tool that can drive machines as power customers needs. Fog nodes, such as tracks, cars, factory floors can survive harsh environmental conditions. Fog computing offers a reduction in latency as data are analyzed locally. This is due to less round trip time and is also a fewer amount of data bandwidth. It reduces the latency requirement and hence quick decisions can be made. This helps in avoiding accidents. It process selected data locally instead of sending them to the cloud for processing. This computing offers better privacy to the user’s data as they are analyzed locally instead of sending them to the cloud. The IT team can manage everything and control the devices.