SlideShare una empresa de Scribd logo
1 de 26
CS4098 – SEMINAR
PRESENTED BY
NIKHIL SABU
B120792CS
FOG COMPUTING
TECHNOLOGY
CONTENTS
• ABSTRACT
• INTRODUCTION
• CHARACTERISTICS OF FOG COMPUTING
• CLOUD vs. FOG
• ARCHITECTURE OF FOG TECHNOLOGY
• APPLICATIONS OF FOG
• CONCLUSION
• REFERENCES
• Extends Cloud computing and services to the edge of the
network.
• Similar to Cloud, Fog provides data, compute, storage, and
application services to end-users.
• Motivations for Fog Computing - Smart Grid, smart traffic lights in
vehicular networks and software defined networks.
ABSTRACT
INTRODUCTION
What is fog computing?
• Fog computing (aka, Edge computing) is a model in which data, processi
ng and applications are concentrated in devices at the network edge rath
er than existing almost entirely in the cloud.
• The term "Fog Computing" was introduced by the Cisco Systems as new
model to ease wireless data transfer to distributed devices in the Internet
of Things (IoT) network paradigm.
• In Fog Computing, devices communicate peer-to-peer to efficiently share
/store data and take local decisions.
What is the need for fog computing ?
• Fog computing was developed to address applications and services that
do not fit the paradigm of the cloud.
• Fog Computing keeps data right where the Internet of Things needs it.
• Existing data protection mechanisms in Cloud Computing such as encrypt
ion failed in securing the data from the attackers.
• Limitations of cloud (high latency, security shortcomings, bandwidth, etc.)
Cloud architecture before the advent of fog technology
Cloud architecture with the advent of fog technology
CHARACTERISTICS OF FOG COMPUTING
• Edge location, location awareness, and low latency : Fog computing su
pport endpoints with finest services at the edge of the network
• Geographical distribution : The services and application objective of the
fog is widely distributed.
• Support for mobility : Using LISP protocol fog devices provide mobility t
echniques like decouple host identity to location identity.
• Real time interactions : fog computing requires real time interactions for
speedy service.
• Heterogeneity : Fog nodes can be deployed in a wide variety of environ
ments.
• Interoperability : Fog components must be able to interoperate in order
to give wide range of services like streaming.
CLOUD vs. FOG
Fog – Solution to Cloud’s Limitations
• Reduction in data movement across the network resulting in
reduced congestion.
• Elimination of bottlenecks resulting from centralized comput
ing systems.
• Improved security of encrypted data as it stays closer to the
end user.
CLOUD vs. FOG
CLOUD vs. FOG
ARCHITECTURE OF FOG TECHNOLOGY
The design of fog architecture or the key components of fog architecture ar
e discussed below:
• Heterogeneous Physical Resources
• Fog Abstraction Layer
• Fog Service Orchestration Layer
• Foglet Software Agent
• Distributed Database
• Policy-Based Service Orchestration
Components in Fog architecture
Heterogeneous Physical Resources:
Heterogeneous in nature, ranging from high-speed links connecting enterpri
se data centers and the core to multiple wireless access technologies towar
ds the edge.
3G/4G, LTE, WiFi etc.
Fog Abstraction Layer:
A uniform and programmable interface for seamless resource management
and control.
The layer provides generic APIs for monitoring, provisioning and controlling
physical resources such as CPU, memory, network and energy.
Fog Service Orchestration Layer:
Provides dynamic, policy-based life-cycle management of Fog services.
Managing services on a large volume of Fog nodes with a wide range of ca
pabilities is achieved with the following technology and components:
• Foglet Software Agent,
• Distributed Database, persistent storage to store policies and resource m
eta-data,
• Policy-Based Service Orchestration, provides policy-based service routing,
i.e., routes an incoming service request to the appropriate service instanc
e that confirms to the relevant business policies.
Policy based orchestration framework of fog technology
APPLICATIONS OF FOG
• Tech giants Cisco and IBM are the driving forces behind fog computing, a
nd link their concept to the emerging Internet of Things (IoT).
• Fog has a direct correlation with IoT.
• According to CISCO, the important areas where fog would play a vital rol
e are the following :
Connected cars
Fog computing is ideal for Connected Vehicles (CV) because real-time intera
ctions will make communications between cars, access points and traffic ligh
ts as safe and efficient as possible.
At some point in time, the connected car will start saving lives by reducing
automobile accidents.
Fog computing will be the best option for all internet connected vehicles be
cause fog computing gives real time interaction.
Connected Vehicles communicating each other
Smart grids
Fog computing allows fast, machine-to-machine (M2M) handshakes and hu
man to machine interactions (HMI), which would work in cooperation with
the cloud.
Based on demand for energy, its obtainability and low cost, these smart dev
ices can switch to other energies like solar and winds. The edge process the
data collected by fog collectors and generate control command to the actu
ators. The filtered data are consumed locally and the balance to the higher t
iers for visualization, real-time reports and transactional analytics. Fog supp
orts semi-permanent storage at the highest tier and momentary storage at
the lowest tier.
Decentralized Smart Building Control
Wireless sensors are installed to measure temperature, humidity, or levels of
various gaseous components in the building atmosphere.
Information can be exchanged among all sensors in the floor and the readin
g can be combined to form reliable measurements.
Using distributed decision making the fog devices react to data.
The system gears up to work together to lower the temperature, input fresh
air and output moisture from the air or increase humidity.
Health Care
Fog computing would be able to obtain sensor data on all levels, and integr
ate all the mutually independent network entities within.
The cloud computing market for healthcare is expected to reach $5.4 billion
by 2017, according to a Markets and Markets report, and fog computing
would allow this on a more localized level.
Smart Cities
CONCLUSION
• We have analyzed Fog Computing and its real time applications.
• Fog computing has the ability to handle the data tsunami created by Inte
rnet of Things.
• The characteristics of fog computing like mobility, proximity to end-users,
low latency, location awareness, heterogeneity and due to its real-time ap
plications fog computing platform is considered as the appropriate platfo
rm for Internet of Things.
• By using the concepts of fog computing, if the same device can be used
for these kind of processing, data generated can be put to immediate us
e and deliver a much better user experience.
REFERENCES
1. CISCO Technology Radar Trends Report:
https://techradar.cisco.com/pdf/ciscotechnology-radar.pdf
2. Feds Look to Fight Leaks With ‘Fog of Disinformation’:
http://www.wired.com/2012/07/fog-computing/
3. What Comes After the Cloud? How About the Fog? :
http://spectrum.ieee.org/tech-talk/computing/networks/what-comes-after
thecloud-how-about-the-fog
4. IJRET: International Journal of Research in Engineering and Technology eISSN:
2319-1163 | pISSN: 2321-7308: FOG COMPUTING: A NEW CONCEPT TO
MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING
ENVIRONMENT BY Sonali Khairnar and Dhanashree Borkar

Más contenido relacionado

La actualidad más candente

Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouMegan O'Keefe
 

La actualidad más candente (20)

Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 
Fog computing
Fog computingFog computing
Fog computing
 

Destacado

What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud ComputingMaikel Mardjan
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksMichael Yung
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 

Destacado (20)

What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Utility fog ppt
Utility fog pptUtility fog ppt
Utility fog ppt
 
Utility Fog
Utility FogUtility Fog
Utility Fog
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 

Similar a Fog computing technology

IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelAhmed Banafa
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of thingsRahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentrationmehedi15
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 

Similar a Fog computing technology (20)

Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar report
Seminar reportSeminar report
Seminar report
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing
fog computingfog computing
fog computing
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
A Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of ThingsA Review- Fog Computing and Its Role in the Internet of Things
A Review- Fog Computing and Its Role in the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 

Último

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Fog computing technology

  • 1. CS4098 – SEMINAR PRESENTED BY NIKHIL SABU B120792CS FOG COMPUTING TECHNOLOGY
  • 2. CONTENTS • ABSTRACT • INTRODUCTION • CHARACTERISTICS OF FOG COMPUTING • CLOUD vs. FOG • ARCHITECTURE OF FOG TECHNOLOGY • APPLICATIONS OF FOG • CONCLUSION • REFERENCES
  • 3. • Extends Cloud computing and services to the edge of the network. • Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. • Motivations for Fog Computing - Smart Grid, smart traffic lights in vehicular networks and software defined networks. ABSTRACT
  • 4. INTRODUCTION What is fog computing? • Fog computing (aka, Edge computing) is a model in which data, processi ng and applications are concentrated in devices at the network edge rath er than existing almost entirely in the cloud. • The term "Fog Computing" was introduced by the Cisco Systems as new model to ease wireless data transfer to distributed devices in the Internet of Things (IoT) network paradigm. • In Fog Computing, devices communicate peer-to-peer to efficiently share /store data and take local decisions.
  • 5.
  • 6. What is the need for fog computing ? • Fog computing was developed to address applications and services that do not fit the paradigm of the cloud. • Fog Computing keeps data right where the Internet of Things needs it. • Existing data protection mechanisms in Cloud Computing such as encrypt ion failed in securing the data from the attackers. • Limitations of cloud (high latency, security shortcomings, bandwidth, etc.)
  • 7. Cloud architecture before the advent of fog technology
  • 8. Cloud architecture with the advent of fog technology
  • 9. CHARACTERISTICS OF FOG COMPUTING • Edge location, location awareness, and low latency : Fog computing su pport endpoints with finest services at the edge of the network • Geographical distribution : The services and application objective of the fog is widely distributed. • Support for mobility : Using LISP protocol fog devices provide mobility t echniques like decouple host identity to location identity. • Real time interactions : fog computing requires real time interactions for speedy service. • Heterogeneity : Fog nodes can be deployed in a wide variety of environ ments. • Interoperability : Fog components must be able to interoperate in order to give wide range of services like streaming.
  • 10. CLOUD vs. FOG Fog – Solution to Cloud’s Limitations • Reduction in data movement across the network resulting in reduced congestion. • Elimination of bottlenecks resulting from centralized comput ing systems. • Improved security of encrypted data as it stays closer to the end user.
  • 13. ARCHITECTURE OF FOG TECHNOLOGY The design of fog architecture or the key components of fog architecture ar e discussed below: • Heterogeneous Physical Resources • Fog Abstraction Layer • Fog Service Orchestration Layer • Foglet Software Agent • Distributed Database • Policy-Based Service Orchestration
  • 14. Components in Fog architecture
  • 15. Heterogeneous Physical Resources: Heterogeneous in nature, ranging from high-speed links connecting enterpri se data centers and the core to multiple wireless access technologies towar ds the edge. 3G/4G, LTE, WiFi etc. Fog Abstraction Layer: A uniform and programmable interface for seamless resource management and control. The layer provides generic APIs for monitoring, provisioning and controlling physical resources such as CPU, memory, network and energy.
  • 16. Fog Service Orchestration Layer: Provides dynamic, policy-based life-cycle management of Fog services. Managing services on a large volume of Fog nodes with a wide range of ca pabilities is achieved with the following technology and components: • Foglet Software Agent, • Distributed Database, persistent storage to store policies and resource m eta-data, • Policy-Based Service Orchestration, provides policy-based service routing, i.e., routes an incoming service request to the appropriate service instanc e that confirms to the relevant business policies.
  • 17. Policy based orchestration framework of fog technology
  • 18. APPLICATIONS OF FOG • Tech giants Cisco and IBM are the driving forces behind fog computing, a nd link their concept to the emerging Internet of Things (IoT). • Fog has a direct correlation with IoT. • According to CISCO, the important areas where fog would play a vital rol e are the following :
  • 19. Connected cars Fog computing is ideal for Connected Vehicles (CV) because real-time intera ctions will make communications between cars, access points and traffic ligh ts as safe and efficient as possible. At some point in time, the connected car will start saving lives by reducing automobile accidents. Fog computing will be the best option for all internet connected vehicles be cause fog computing gives real time interaction.
  • 21. Smart grids Fog computing allows fast, machine-to-machine (M2M) handshakes and hu man to machine interactions (HMI), which would work in cooperation with the cloud. Based on demand for energy, its obtainability and low cost, these smart dev ices can switch to other energies like solar and winds. The edge process the data collected by fog collectors and generate control command to the actu ators. The filtered data are consumed locally and the balance to the higher t iers for visualization, real-time reports and transactional analytics. Fog supp orts semi-permanent storage at the highest tier and momentary storage at the lowest tier.
  • 22. Decentralized Smart Building Control Wireless sensors are installed to measure temperature, humidity, or levels of various gaseous components in the building atmosphere. Information can be exchanged among all sensors in the floor and the readin g can be combined to form reliable measurements. Using distributed decision making the fog devices react to data. The system gears up to work together to lower the temperature, input fresh air and output moisture from the air or increase humidity.
  • 23. Health Care Fog computing would be able to obtain sensor data on all levels, and integr ate all the mutually independent network entities within. The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, according to a Markets and Markets report, and fog computing would allow this on a more localized level. Smart Cities
  • 24.
  • 25. CONCLUSION • We have analyzed Fog Computing and its real time applications. • Fog computing has the ability to handle the data tsunami created by Inte rnet of Things. • The characteristics of fog computing like mobility, proximity to end-users, low latency, location awareness, heterogeneity and due to its real-time ap plications fog computing platform is considered as the appropriate platfo rm for Internet of Things. • By using the concepts of fog computing, if the same device can be used for these kind of processing, data generated can be put to immediate us e and deliver a much better user experience.
  • 26. REFERENCES 1. CISCO Technology Radar Trends Report: https://techradar.cisco.com/pdf/ciscotechnology-radar.pdf 2. Feds Look to Fight Leaks With ‘Fog of Disinformation’: http://www.wired.com/2012/07/fog-computing/ 3. What Comes After the Cloud? How About the Fog? : http://spectrum.ieee.org/tech-talk/computing/networks/what-comes-after thecloud-how-about-the-fog 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308: FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT BY Sonali Khairnar and Dhanashree Borkar