SlideShare a Scribd company logo
Sustainability and Fog Computing:
Applications, Advantages and Challenges
Abdul Majid Farooqi
School of Engineering Sciences and Technology (SEST)
Jamia Hamdard
(Deemed to be University)
New Delhi. India
3rd International Conference
on
Computing and Communication Technologies
(ICCCT’19)
Chennai, India
Presentation Summery
• Introduction to Fog Computing
• Fog Computing Definition
• Problem Statement
• Literature Review
• Fog Computing Applications
• Fog Computing Advantages
• Fog Computing Challenges
• Fog Computing Architecture
• Fog Computing vs Cloud Computing
• Conclusion
• References
Introduction to Fog Computing
• In recent years fog computing has emerged as a load balancer for data centers.
• Enormous amount of internet traffic is generated every day and growing.
• Global IP traffic in 2016 was 96 exabyte per month and will nearly triple by 2021,
Consumer IP traffic will reach 232.7 exabyte per month and business IP traffic
will be 45.5 exabyte per month by 2021 [1] .
• Due to this tremendous amount of data transaction, data centers require more
powerful computing devices to perform certain tasks efficiently.
Introduction to Fog Computing
Continued…
• Powerful computing devices consume electricity
and emit CO2 in the atmosphere which is very
harmful for the environment [2].
• Another term related to cloud computing has
emerged recently, called Internet of Things (IoT).
• In simple words IoT means “connect the
unconnected” [3] through the Internet.
• According to International Data Corporation (IDC)
statistics [4] by 2020:
Introduction to Fog Computing
Continued…
• Data center burden has been further increasing because cloud computing is
the only cost-efficient choice left that can handle such massive amount of
data to be stored and processed.
• Such issues compelled researchers to think about an alternative of the cloud
or something which can at least extend the cloud services so that data center’s
load could be lighter.
• That’s why fog computing came into limelight in 2012 [5] and became
further prevalent in 2015 [6].
Fog Computing Definition
• Fog computing horizontally provides cloud computing features at the edge of
user premises and distributes storage, networking and computing hardware
without compromising security, latency and performance.
Problem Statement
• In 2017, approximately 8 million data centers all over the globe were handling the
entire data load. They required 416.2 terawatt-hours of electricity [7].
• In real world such amount of energy emits as much CO2 as more than 33 million
houses emit in one year [8].
• That is 2 percent of total global use, and it’s most likely to reach a never before 5
percent of global electricity consumption by 2020 [7]
• To reduce the heavy burden of data centers fog computing emerges as an extended
solution of cloud.
Literature Review
• Wei Li et al. focused on building a sustainable edge computing, they proposed a
unified energy management framework for sustainable edge computing.
• To reduce energy consumption in fog computing Jianwen Xu et al. applied in-
memory caching techniques. They designed two kinds of Time to Live (TTL) in
four cache replacement policies: (i) FIFO (ii) LFU (iii) LRU and (iv) RR to cache
data at the fog.
• C. Mouradian presents a comprehensive survey on fog computing with research
challenges and critically review the state of the art
Fog Computing Applications
• Smart City
• Real-time vehicular ad hoc networks (VANETs)
• Smart Grid
• Health care system
Fog Computing Advantages
• It reduces the latency, cost and geographical distance between consumer
and data center.
• It increases the performance of data processing and security of data in
comparison to cloud.
• It is more reliable and confidential.
Fog Computing Challenges
• Application Offloading
• Resource Sharing
• Energy Consumption
• Security and Privacy
Fog Computing
Architecture
• Tier 1:It consists of different types of
sensors, like smart sensors, wireless
sensors, also known as Terminal Node
(TN). These TNs work in heterogenous
environment and communicate with
middle tier.
• Tier 2: The middle layer of fog computing
architecture is fog computing itself, it
consists of smart and intelligent devices.
• Tier 3: Finally, the topmost layer is cloud
data center full of servers and several
other high-end devices.
Fog Computing vs Cloud
Computing
• Indeed, fog and cloud both
provide computation, storage
and applications, still there
are key differences between
them.
• We have summarized the key
differences between fog and
cloud in tabular form.
Conclusion
• In this survey we defined fog computing and discussed why we need fog, also we
surveyed challenges of fog computing.
• We also talked about some fog applications and discussed how we can achieve
sustainability in smart city, VANETs, smart grid and health care applications.
• We reviewed several research and survey papers.
• Our main goal is stablishing a sustainable modern computing environment for the
world.
For full paper please visit https://ieeexplore.ieee.org/document/8824983
References
[1] “Cisco Visual Networking Index: Forecast and Methodology, 2016–2021,” p. 17, 2017.
[2] A. Jain, M. Mishra, S. K. Peddoju, and N. Jain, “Energy efficient computing- Green cloud computing,” 2013 International
Conference on Energy Efficient Technologies for Sustainability, ICEETS 2013, pp. 978–982, 2013.
[3] D. Hanes, IoT fundamentals : networking technologies, protocols, and use cases for the Internet of Things, 1st ed. Cisco
Press, 2017.
[4] M. Mukherjee, L. Shu, and D. Wang, “Survey of Fog Computing: Fundamental, Network Applications, and Research
Challenges,” IEEE Communications Surveys & Tutorials, no. c, p. 30, 2018.
[5] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” Proceedings of the
first edition of the MCC workshop on Mobile cloud computing, pp. 13–16, 2012.
[6] M. Janakiram, “Is Fog Computing The Next Big Thing In Internet of Things?,” Forbes Magazine, 2016. [Online]. Available:
https://www.forbes.com/sites/janakirammsv/2016/04/18/is-fog-computing-the-next-big-thing-in-internet-of-
things/#563dd9b5608d. [Accessed: 08-Oct-2018].
[7] Jim Witham, “Achieving Data Center Energy Efficiency,” 2018. [Online]. Available:
https://www.datacenterknowledge.com/industry-perspectives/achieving-data-center-energy-efficiency. [Accessed: 15-Oct-2018].
[8] C. US EPA, OAR,OAP, “Greenhouse Gas Equivalencies Calculator,” United States Environmental Protection Agency, 2018.
[Online]. Available: https://www.epa.gov/energy/greenhouse-gas-equivalencies-calculator. [Accessed: 16-Oct-2018].
Thank You
Abdul Majid Farooqi

More Related Content

What's hot

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
Navjyotsinh Jadeja
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
Sathvik N Prasad
 
Edge computing
Edge computingEdge computing
Edge computing
Biddut Hossain
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
PriyaMaurya52
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
Ali Habeeb
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
Er. Ajay Sirsat
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
Ido Flatow
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
Amarjeetsingh Thakur
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of Things
Sofian Hadiwijaya
 
Edge computing
Edge computingEdge computing
Edge computing
AbhayDhupar
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
Samir Bounab
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
shashidharPapishetty
 
Networking in cloud computing
Networking in cloud computingNetworking in cloud computing
Networking in cloud computing
Barani Tharan
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
Tarika Verma
 

What's hot (20)

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Edge computing
Edge computingEdge computing
Edge computing
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Google Cloud IoT Core
Google Cloud IoT CoreGoogle Cloud IoT Core
Google Cloud IoT Core
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of Things
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
Networking in cloud computing
Networking in cloud computingNetworking in cloud computing
Networking in cloud computing
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 

Similar to Sustainability and fog computing applications, advantages and challenges

Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
dbpublications
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdf
AsiyaKhan63
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
IJECEIAES
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
Emily Smith
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
suthi
 
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
Editor IJCATR
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
ijccsa
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
ijcsa
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
IjictTeam
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
IRJET Journal
 
Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...
IJECEIAES
 
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
IJCSIS Research Publications
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
IRJET Journal
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
IJCSEA Journal
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
IJCSEA Journal
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
IJERA Editor
 

Similar to Sustainability and fog computing applications, advantages and challenges (20)

Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdf
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
Building Blocks for Eco-efficient Cloud Computing for Higher Learning Institu...
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 
Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...Insights on critical energy efficiency approaches in internet-ofthings applic...
Insights on critical energy efficiency approaches in internet-ofthings applic...
 
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Sustainability and fog computing applications, advantages and challenges

  • 1. Sustainability and Fog Computing: Applications, Advantages and Challenges Abdul Majid Farooqi School of Engineering Sciences and Technology (SEST) Jamia Hamdard (Deemed to be University) New Delhi. India 3rd International Conference on Computing and Communication Technologies (ICCCT’19) Chennai, India
  • 2. Presentation Summery • Introduction to Fog Computing • Fog Computing Definition • Problem Statement • Literature Review • Fog Computing Applications • Fog Computing Advantages • Fog Computing Challenges • Fog Computing Architecture • Fog Computing vs Cloud Computing • Conclusion • References
  • 3. Introduction to Fog Computing • In recent years fog computing has emerged as a load balancer for data centers. • Enormous amount of internet traffic is generated every day and growing. • Global IP traffic in 2016 was 96 exabyte per month and will nearly triple by 2021, Consumer IP traffic will reach 232.7 exabyte per month and business IP traffic will be 45.5 exabyte per month by 2021 [1] . • Due to this tremendous amount of data transaction, data centers require more powerful computing devices to perform certain tasks efficiently.
  • 4. Introduction to Fog Computing Continued… • Powerful computing devices consume electricity and emit CO2 in the atmosphere which is very harmful for the environment [2]. • Another term related to cloud computing has emerged recently, called Internet of Things (IoT). • In simple words IoT means “connect the unconnected” [3] through the Internet. • According to International Data Corporation (IDC) statistics [4] by 2020:
  • 5. Introduction to Fog Computing Continued… • Data center burden has been further increasing because cloud computing is the only cost-efficient choice left that can handle such massive amount of data to be stored and processed. • Such issues compelled researchers to think about an alternative of the cloud or something which can at least extend the cloud services so that data center’s load could be lighter. • That’s why fog computing came into limelight in 2012 [5] and became further prevalent in 2015 [6].
  • 6. Fog Computing Definition • Fog computing horizontally provides cloud computing features at the edge of user premises and distributes storage, networking and computing hardware without compromising security, latency and performance.
  • 7. Problem Statement • In 2017, approximately 8 million data centers all over the globe were handling the entire data load. They required 416.2 terawatt-hours of electricity [7]. • In real world such amount of energy emits as much CO2 as more than 33 million houses emit in one year [8]. • That is 2 percent of total global use, and it’s most likely to reach a never before 5 percent of global electricity consumption by 2020 [7] • To reduce the heavy burden of data centers fog computing emerges as an extended solution of cloud.
  • 8. Literature Review • Wei Li et al. focused on building a sustainable edge computing, they proposed a unified energy management framework for sustainable edge computing. • To reduce energy consumption in fog computing Jianwen Xu et al. applied in- memory caching techniques. They designed two kinds of Time to Live (TTL) in four cache replacement policies: (i) FIFO (ii) LFU (iii) LRU and (iv) RR to cache data at the fog. • C. Mouradian presents a comprehensive survey on fog computing with research challenges and critically review the state of the art
  • 9. Fog Computing Applications • Smart City • Real-time vehicular ad hoc networks (VANETs) • Smart Grid • Health care system
  • 10. Fog Computing Advantages • It reduces the latency, cost and geographical distance between consumer and data center. • It increases the performance of data processing and security of data in comparison to cloud. • It is more reliable and confidential.
  • 11. Fog Computing Challenges • Application Offloading • Resource Sharing • Energy Consumption • Security and Privacy
  • 12. Fog Computing Architecture • Tier 1:It consists of different types of sensors, like smart sensors, wireless sensors, also known as Terminal Node (TN). These TNs work in heterogenous environment and communicate with middle tier. • Tier 2: The middle layer of fog computing architecture is fog computing itself, it consists of smart and intelligent devices. • Tier 3: Finally, the topmost layer is cloud data center full of servers and several other high-end devices.
  • 13. Fog Computing vs Cloud Computing • Indeed, fog and cloud both provide computation, storage and applications, still there are key differences between them. • We have summarized the key differences between fog and cloud in tabular form.
  • 14. Conclusion • In this survey we defined fog computing and discussed why we need fog, also we surveyed challenges of fog computing. • We also talked about some fog applications and discussed how we can achieve sustainability in smart city, VANETs, smart grid and health care applications. • We reviewed several research and survey papers. • Our main goal is stablishing a sustainable modern computing environment for the world. For full paper please visit https://ieeexplore.ieee.org/document/8824983
  • 15. References [1] “Cisco Visual Networking Index: Forecast and Methodology, 2016–2021,” p. 17, 2017. [2] A. Jain, M. Mishra, S. K. Peddoju, and N. Jain, “Energy efficient computing- Green cloud computing,” 2013 International Conference on Energy Efficient Technologies for Sustainability, ICEETS 2013, pp. 978–982, 2013. [3] D. Hanes, IoT fundamentals : networking technologies, protocols, and use cases for the Internet of Things, 1st ed. Cisco Press, 2017. [4] M. Mukherjee, L. Shu, and D. Wang, “Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges,” IEEE Communications Surveys & Tutorials, no. c, p. 30, 2018. [5] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp. 13–16, 2012. [6] M. Janakiram, “Is Fog Computing The Next Big Thing In Internet of Things?,” Forbes Magazine, 2016. [Online]. Available: https://www.forbes.com/sites/janakirammsv/2016/04/18/is-fog-computing-the-next-big-thing-in-internet-of- things/#563dd9b5608d. [Accessed: 08-Oct-2018]. [7] Jim Witham, “Achieving Data Center Energy Efficiency,” 2018. [Online]. Available: https://www.datacenterknowledge.com/industry-perspectives/achieving-data-center-energy-efficiency. [Accessed: 15-Oct-2018]. [8] C. US EPA, OAR,OAP, “Greenhouse Gas Equivalencies Calculator,” United States Environmental Protection Agency, 2018. [Online]. Available: https://www.epa.gov/energy/greenhouse-gas-equivalencies-calculator. [Accessed: 16-Oct-2018].