Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

fog computing ppt

15.268 visualizaciones

Publicado el

Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud

Publicado en: Tecnología
  • Secrets To Working Online, Hundreds of online opportunites you can profit with today! ★★★ http://scamcb.com/ezpayjobs/pdf
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí

fog computing ppt

  1. 1. Technical Seminar on FOG COMPUTING Under the Guidance of P.V.R.K.MURTHY, M.Tech Assistant Professor Presented By
  2. 2. CONTENTS  Introduction  Limitations overcome from cloud  Limitations overcome in fog  Existing System  Proposed System  Advantages  Disadvantages  Conclusion
  3. 3. • Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. • The term "Fog Computing" was introduced by the Cisco Systems . INTRODUCTION
  4. 4. • CISCO recently delivered the vision of fog computing to enable applications on billions of connected devices to run directly at the network edge. Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches. Cisco brings the open source Linux and network operating system together in a single networked device.
  5. 5. Cloud Fog Cor e Locations Edge Simple three level hierarchy
  6. 6. • cloud computing has so many advantages, it also suffers from certain shortcomings too. • High capacity(bandwidth) • Client access link. • High latency • security Limitations over from cloud
  7. 7. • Reduction in data movement across the network resulting in reduced congestion • Elimination of bottlenecks resulting from centralized computing systems • Improved security of encrypted data as it stays closer to the end user Limitations overcome in FOG
  8. 8. • Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as-you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications EXISTING SYSTEM
  9. 9. • Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains. PROPOSED SYSTEM
  10. 10. • Fog can be distinguished from Cloud by its proximity to end- users. • The dense geographical distribution and its support for mobility. • It provides low latency, location awareness, and improves quality-of-services (QoS) and real time applications. ADVANTAGES
  11. 11. • Existing data protection mechanisms such as encryption was failed in securing the data from the attackers. • It does not verify whether the user was authorized or not. • Cloud computing security does not focus on ways of secure the data from unauthorized access. DISADVANTAGES
  12. 12. • Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other. • Next, Fog computing based SDN in vehicular networks will receive due attention. FUTURE ENCHANCEMENT
  13. 13. • Fog computing advantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs). We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud. CONCLUSION
  14. 14. [1] F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. [2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16. REFERENCES

×