SlideShare a Scribd company logo
1 of 28
FOG Computing
Internet of Things (IoT)
• Connects internet devices – “things” (tablets, sensors,
gateways, mobile-phones) to enable new forms of
communication between things and people and
between the IoTs themselves
• These connections create a network of IoTs
• This poses new challenges to the ways things
communicate with each other and with people and the
way data are manipulated once they are generated at
the edges of the network
• How, what data are transmitted over the network?
• When, where data are processed or stored ?
10/29/2022 Fog Computing 2
What is It? [Cisco 2015]
• Ιntroduced by Cisco, a bridge between IoTs and the Cloud
• FOG extends cloud to be closer to things that produce data
• Analyze IoT data closer to where its collected so as to
minimize latency and processing load on cloud
– Any device with computing, storage, network connectivity can be a FOG node
– Can be deployed anywhere (Factory floor, vehicle, human body, etc)
10/29/2022 Fog Computing 3
Cloud and IoT: Fog can develop
anywhere in-between the two
10/29/2022 Fog Computing 4
Why FOG, What it means to Business?
• IoT speeds up awareness and response to events
• By the time data makes its way to the cloud for
analysis, the opportunity to act might be gone
• Faster responses can improve output, service
quality, safety
• Todays cloud models are not always designed for
the volume, variety and speed of data
– Moving all data to the cloud for analysis would slow
down processing, responses, takes bandwidth and is
expensive
10/29/2022 Fog Computing 5
More issues
• Despite Cloud’s advantages, health care, businesses,
government, military organizations and entities that
manage sensitive or classified data are reluctant to
adopt cloud based solutions due to security risks of
transferring data over the Internet
• Certain functions are naturally more advantageous
to carry out in Fog while others are better suited to
cloud
• Software To Data Approach: bring software to the
data rather than transferring data to the cloud
– Transfer analysis results to the cloud
• FOG addresses this problem as well
10/29/2022 Fog Computing 6
What you get ?
• FOG filters and analyzes the most time intensive data
at the network edge close to where it is generated
• Milliseconds matter when trying to prevent
manufacturing line shutdowns and make the difference
between averting disaster and a cascading system
failure
• Benefits include
– Greater business agility, security
– Deeper insights, improved privacy
– Lower operating cost (bandwidth, storage, processing)
– Sends data loads to cloud only for storage and further data
analysis (big data analysis)
10/29/2022 Fog Computing 7
Application Areas
• Smart cities: collect data on city activities e.g. traffic (change
signals on surveillance of incoming traffic to prevent accidents
or reduce congestion. Data could also be sent to the cloud for
longer-term analytics)
• Wearable Technology: data from wearable sensors need to be
processed locally to inform user and also communicated to
the cloud
• Wellbeing: monitor environmental conditions in house, health
status, in house operations for improving the quality of living
especially for elderly, disabled
• Industry 4.0: a sensor on a critical machine sends readings
associated with imminent failure
10/29/2022 Fog Computing 8
What happens in Fog/Cloud?
• Fog Nodes: micro data centers at network edge
– Like small clouds: cloudlets
– Intelligent controllers and gateways collect data from devices
– Receive feeds from IoTs using a protocol in real-time
– Run IoT apps for real-time control, context processing, data
analytics
– Provide transient storage
– Send periodic data summaries to the cloud
• The cloud: public, private cloud etc.
– Receives and archives data summaries from Fog nodes
– Performs data analytics to gain business insight
– Can send new application rules to Fog nodes based on these
insights, new business operation plans etc.
10/29/2022 Fog Computing 9
Cloud vs FOG [Chiang 2016]
• Fog and Cloud will co-exist and work together
• FOG will carry-out substantial amount of storage at or near
end-user rather than on large scale data center
• FOG will carry-out substantial amount of communication at
or near the end-user rather than all routed through the
backbone network
• FOG will carry-our substantial amount of management,
control and configuration at or near the end-user rather
than on large scale servers
• The decision on what functions move to Cloud or keep at
FOG nodes is not always easy, depends on application
• FOG and Cloud are inder-dependent and mutually
beneficial
10/29/2022 Fog Computing 10
Fog Architecture (by Cisco)
10/29/2022 Fog Computing 11
Example Architecture
10/29/2022 Fog Computing 12
FOG NODE
Security, Privacy and Trust
• While FOG may enhance security, it presents new security
challenges
• User authentication at IoTs and gateways is an issue
– Each IoT has an IP address
– Easier to hack FOG nodes and IoTs
– Malicious users can read/replace/tamper IoTs and their readings
(e.g. smart meters installed at consumers house), or use
consumer information for profit
• In large networks, probably many un-trustworthy users 
clients don’t trust each other, or are not willing to
participate
• More issues: Distributed control in a decentralized, mobile
crowd of IoTs
10/29/2022 Fog Computing 13
FOG Reference Architecture (RA)
• The means of describing and understanding the requirements
of a domain where the architecture applies
• Proposed by OpenFog consortium: tech industry, research
and academic institutions (est. 2015), still incomplete …
• Fog RA should support at/near end-users
– Low latency storage
– Computation to avoid latency/network costs
– Management, network measurement, control, configuration
– Allow analytics results to be securely copied to backend cloud
– Business deployment
10/29/2022 Fog Computing 14
Principles (Pillars) of FOG RA
1. Security: end-to-end, node and network security
2. Scalability: nodes, networks, storage and all services are scalable
without disrupting system performance
3. Openness: nodes info and functionality is transparent to
applications, nodes can be created anywhere and be discovered /
connected / used, while ensuring security/safety/privacy
4. Autonomy: no single point of failure
5. Programmability: nodes can be reprogrammed or updated
6. Reliability: high availability (uptime)
7. Agility: transform data into actionable insights, quickly respond to
changes
8. Hierarchy: not prerequisite, resources can be seen as a logical
hierarchy based on the functional requirements of the IoT system
10/29/2022 Fog Computing 15
FOG Hierarchy Examples
10/29/2022 Fog Computing 16
Examples 1 & 2
• Example 1: fog deployment hierarchy independent of
the cloud
– E.g. the cloud can’t be used due to regulatory compliance,
security and privacy reasons, unavailability of a central
cloud in an area
– armed forces combat systems, drone operations, some
healthcare systems, hospitals, and ATM banking systems
• Example 2: information processing in fog deployments
located close to the infrastructure/process being
managed.
– commercial building management, commercial solar panel
monitoring, cable tv etc.
10/29/2022 Fog Computing 17
FOG Hierarchy Examples
10/29/2022 Fog Computing 18
Examples 3 & 4
• Example 3: local fog for time-sensitive
computation, the cloud is used for operational
and business-related information processing
• Example 4: constrained environments in which
the deployment of fog infrastructure may not
be feasible or economical
– E.g. Agriculture, whether stations, connected cars
10/29/2022 Fog Computing 19
N-tier FOG Architecture
• Presentation, application processing, and data
management functions are physically separated (3-
tiers)
– developers acquire the option of modifying or adding a
specific layer, instead of reworking the entire application
• How many tiers in FOG: depends on number of
sensors, type of work per sensor, latency between
nodes, reliability/availability of nodes
• In each tier, each level acquires or computes
information and shifts intelligence to higher levels
– Better organization of system intelligence
10/29/2022 Fog Computing 20
Intelligence in FOG
10/29/2022 Fog Computing 21
Node Management
• Manageability systems that can survive and
manage fog nodes in all power states
– Produce reports on the state of fog nodes
– Automate discovery, registration and provision of end
devices
– Gain full understanding of end devices (in terms of
their resources, health, operational state)
– More manageability aspects: system software and
firmware updates, alerts on abnormal operation
– Manage events, start/stop, define data flows
– Security analysis and response
10/29/2022 Fog Computing 22
Physical Node Safety
• Perform a security analysis and threat assessment
in order to identify the needs the fog node
• Depends also on the location of the fog node and
the degree of physical access to it
• Apply anti-tamper mechanisms to prevent
physical or electronic attacks
• Measures: resistance (material), Evidence (prove
the event), Detection (e.g. by Sensors), response
(countermeasures e.g. clear sensitive data,
shutdown or reset).
10/29/2022 Fog Computing 23
FOG Ref. Architecture Overview
10/29/2022 Fog Computing 24
Docker (containers)
Application Services (containerized)
South End: Where sensors / devices connect to FOG
North End: connect to cloud or applications
Application-Node Services Layer
10/29/2022 Fog Computing 25
Application - Node Services 1/2
• May run in virtualized (containerized) environments
• Fog connector services: run at the south end, enable
connections with Things, support various protocols,
translate data to common data structures (e.g. JSON)
• Core services: separate the edge device from the
application running in Fog node, collect data from the
device and make them available to upper level services
(e.g. cloud), or pass commands to lower level
• Support services: database, event broker, logging,
scheduling, service registration, data clean-up etc.
10/29/2022 Fog Computing 26
Application - Node Services 2/2
• Analytic services: data filtering, averages, machine learning,
– local decision (e.g. shutdown when temperature exceeds
threshold), anomaly detection (malfunctioning device, intrusion
detection)
– Application logic services
• Integration services: allow outside fog nodes, users or
applications to connect
– Transform data to desired format (e.g. JSON, XML)
– Accepts service requests (e.g. REST to prescribed addresses
• User interface: responsible for display and communication
with applications and users:
– status and operation of fog node, results of analytics processing,
interface for node management and probably Web site
10/29/2022 Fog Computing 27
References
• FOG Computing and the Internet of Things: Extend the
Cloud to where the Things Are, Cisco, White Paper, 2015
https://www.cisco.com/c/dam/en_us/solutions/trends/iot/
docs/computing-overview.pdf
• FOG and IoT: An Overview of Research Opportunities, M.
Chiang, T.Zhang, 2016
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=74
98684
• OpenFog Architecture Overview, OpenFog Architecture
Working Group, White paper, Feb. 2017,
https://www.openfogconsortium.org/wp-
content/uploads/OpenFog_Reference_Architecture_2_09_
17-FINAL.pdf
10/29/2022 Fog Computing 28

More Related Content

Similar to FG2.pptx

Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsSabelo Dlamini
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptxSelvaraj Seerangan
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesBiren Gandhi
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.IRJET Journal
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 

Similar to FG2.pptx (20)

semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applications
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx[PPT] _ Unit 2 _ Complete PPT.pptx
[PPT] _ Unit 2 _ Complete PPT.pptx
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Fog security
Fog securityFog security
Fog security
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

FG2.pptx

  • 2. Internet of Things (IoT) • Connects internet devices – “things” (tablets, sensors, gateways, mobile-phones) to enable new forms of communication between things and people and between the IoTs themselves • These connections create a network of IoTs • This poses new challenges to the ways things communicate with each other and with people and the way data are manipulated once they are generated at the edges of the network • How, what data are transmitted over the network? • When, where data are processed or stored ? 10/29/2022 Fog Computing 2
  • 3. What is It? [Cisco 2015] • Ιntroduced by Cisco, a bridge between IoTs and the Cloud • FOG extends cloud to be closer to things that produce data • Analyze IoT data closer to where its collected so as to minimize latency and processing load on cloud – Any device with computing, storage, network connectivity can be a FOG node – Can be deployed anywhere (Factory floor, vehicle, human body, etc) 10/29/2022 Fog Computing 3
  • 4. Cloud and IoT: Fog can develop anywhere in-between the two 10/29/2022 Fog Computing 4
  • 5. Why FOG, What it means to Business? • IoT speeds up awareness and response to events • By the time data makes its way to the cloud for analysis, the opportunity to act might be gone • Faster responses can improve output, service quality, safety • Todays cloud models are not always designed for the volume, variety and speed of data – Moving all data to the cloud for analysis would slow down processing, responses, takes bandwidth and is expensive 10/29/2022 Fog Computing 5
  • 6. More issues • Despite Cloud’s advantages, health care, businesses, government, military organizations and entities that manage sensitive or classified data are reluctant to adopt cloud based solutions due to security risks of transferring data over the Internet • Certain functions are naturally more advantageous to carry out in Fog while others are better suited to cloud • Software To Data Approach: bring software to the data rather than transferring data to the cloud – Transfer analysis results to the cloud • FOG addresses this problem as well 10/29/2022 Fog Computing 6
  • 7. What you get ? • FOG filters and analyzes the most time intensive data at the network edge close to where it is generated • Milliseconds matter when trying to prevent manufacturing line shutdowns and make the difference between averting disaster and a cascading system failure • Benefits include – Greater business agility, security – Deeper insights, improved privacy – Lower operating cost (bandwidth, storage, processing) – Sends data loads to cloud only for storage and further data analysis (big data analysis) 10/29/2022 Fog Computing 7
  • 8. Application Areas • Smart cities: collect data on city activities e.g. traffic (change signals on surveillance of incoming traffic to prevent accidents or reduce congestion. Data could also be sent to the cloud for longer-term analytics) • Wearable Technology: data from wearable sensors need to be processed locally to inform user and also communicated to the cloud • Wellbeing: monitor environmental conditions in house, health status, in house operations for improving the quality of living especially for elderly, disabled • Industry 4.0: a sensor on a critical machine sends readings associated with imminent failure 10/29/2022 Fog Computing 8
  • 9. What happens in Fog/Cloud? • Fog Nodes: micro data centers at network edge – Like small clouds: cloudlets – Intelligent controllers and gateways collect data from devices – Receive feeds from IoTs using a protocol in real-time – Run IoT apps for real-time control, context processing, data analytics – Provide transient storage – Send periodic data summaries to the cloud • The cloud: public, private cloud etc. – Receives and archives data summaries from Fog nodes – Performs data analytics to gain business insight – Can send new application rules to Fog nodes based on these insights, new business operation plans etc. 10/29/2022 Fog Computing 9
  • 10. Cloud vs FOG [Chiang 2016] • Fog and Cloud will co-exist and work together • FOG will carry-out substantial amount of storage at or near end-user rather than on large scale data center • FOG will carry-out substantial amount of communication at or near the end-user rather than all routed through the backbone network • FOG will carry-our substantial amount of management, control and configuration at or near the end-user rather than on large scale servers • The decision on what functions move to Cloud or keep at FOG nodes is not always easy, depends on application • FOG and Cloud are inder-dependent and mutually beneficial 10/29/2022 Fog Computing 10
  • 11. Fog Architecture (by Cisco) 10/29/2022 Fog Computing 11
  • 12. Example Architecture 10/29/2022 Fog Computing 12 FOG NODE
  • 13. Security, Privacy and Trust • While FOG may enhance security, it presents new security challenges • User authentication at IoTs and gateways is an issue – Each IoT has an IP address – Easier to hack FOG nodes and IoTs – Malicious users can read/replace/tamper IoTs and their readings (e.g. smart meters installed at consumers house), or use consumer information for profit • In large networks, probably many un-trustworthy users  clients don’t trust each other, or are not willing to participate • More issues: Distributed control in a decentralized, mobile crowd of IoTs 10/29/2022 Fog Computing 13
  • 14. FOG Reference Architecture (RA) • The means of describing and understanding the requirements of a domain where the architecture applies • Proposed by OpenFog consortium: tech industry, research and academic institutions (est. 2015), still incomplete … • Fog RA should support at/near end-users – Low latency storage – Computation to avoid latency/network costs – Management, network measurement, control, configuration – Allow analytics results to be securely copied to backend cloud – Business deployment 10/29/2022 Fog Computing 14
  • 15. Principles (Pillars) of FOG RA 1. Security: end-to-end, node and network security 2. Scalability: nodes, networks, storage and all services are scalable without disrupting system performance 3. Openness: nodes info and functionality is transparent to applications, nodes can be created anywhere and be discovered / connected / used, while ensuring security/safety/privacy 4. Autonomy: no single point of failure 5. Programmability: nodes can be reprogrammed or updated 6. Reliability: high availability (uptime) 7. Agility: transform data into actionable insights, quickly respond to changes 8. Hierarchy: not prerequisite, resources can be seen as a logical hierarchy based on the functional requirements of the IoT system 10/29/2022 Fog Computing 15
  • 17. Examples 1 & 2 • Example 1: fog deployment hierarchy independent of the cloud – E.g. the cloud can’t be used due to regulatory compliance, security and privacy reasons, unavailability of a central cloud in an area – armed forces combat systems, drone operations, some healthcare systems, hospitals, and ATM banking systems • Example 2: information processing in fog deployments located close to the infrastructure/process being managed. – commercial building management, commercial solar panel monitoring, cable tv etc. 10/29/2022 Fog Computing 17
  • 19. Examples 3 & 4 • Example 3: local fog for time-sensitive computation, the cloud is used for operational and business-related information processing • Example 4: constrained environments in which the deployment of fog infrastructure may not be feasible or economical – E.g. Agriculture, whether stations, connected cars 10/29/2022 Fog Computing 19
  • 20. N-tier FOG Architecture • Presentation, application processing, and data management functions are physically separated (3- tiers) – developers acquire the option of modifying or adding a specific layer, instead of reworking the entire application • How many tiers in FOG: depends on number of sensors, type of work per sensor, latency between nodes, reliability/availability of nodes • In each tier, each level acquires or computes information and shifts intelligence to higher levels – Better organization of system intelligence 10/29/2022 Fog Computing 20
  • 21. Intelligence in FOG 10/29/2022 Fog Computing 21
  • 22. Node Management • Manageability systems that can survive and manage fog nodes in all power states – Produce reports on the state of fog nodes – Automate discovery, registration and provision of end devices – Gain full understanding of end devices (in terms of their resources, health, operational state) – More manageability aspects: system software and firmware updates, alerts on abnormal operation – Manage events, start/stop, define data flows – Security analysis and response 10/29/2022 Fog Computing 22
  • 23. Physical Node Safety • Perform a security analysis and threat assessment in order to identify the needs the fog node • Depends also on the location of the fog node and the degree of physical access to it • Apply anti-tamper mechanisms to prevent physical or electronic attacks • Measures: resistance (material), Evidence (prove the event), Detection (e.g. by Sensors), response (countermeasures e.g. clear sensitive data, shutdown or reset). 10/29/2022 Fog Computing 23
  • 24. FOG Ref. Architecture Overview 10/29/2022 Fog Computing 24 Docker (containers) Application Services (containerized) South End: Where sensors / devices connect to FOG North End: connect to cloud or applications
  • 26. Application - Node Services 1/2 • May run in virtualized (containerized) environments • Fog connector services: run at the south end, enable connections with Things, support various protocols, translate data to common data structures (e.g. JSON) • Core services: separate the edge device from the application running in Fog node, collect data from the device and make them available to upper level services (e.g. cloud), or pass commands to lower level • Support services: database, event broker, logging, scheduling, service registration, data clean-up etc. 10/29/2022 Fog Computing 26
  • 27. Application - Node Services 2/2 • Analytic services: data filtering, averages, machine learning, – local decision (e.g. shutdown when temperature exceeds threshold), anomaly detection (malfunctioning device, intrusion detection) – Application logic services • Integration services: allow outside fog nodes, users or applications to connect – Transform data to desired format (e.g. JSON, XML) – Accepts service requests (e.g. REST to prescribed addresses • User interface: responsible for display and communication with applications and users: – status and operation of fog node, results of analytics processing, interface for node management and probably Web site 10/29/2022 Fog Computing 27
  • 28. References • FOG Computing and the Internet of Things: Extend the Cloud to where the Things Are, Cisco, White Paper, 2015 https://www.cisco.com/c/dam/en_us/solutions/trends/iot/ docs/computing-overview.pdf • FOG and IoT: An Overview of Research Opportunities, M. Chiang, T.Zhang, 2016 http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=74 98684 • OpenFog Architecture Overview, OpenFog Architecture Working Group, White paper, Feb. 2017, https://www.openfogconsortium.org/wp- content/uploads/OpenFog_Reference_Architecture_2_09_ 17-FINAL.pdf 10/29/2022 Fog Computing 28