SlideShare uma empresa Scribd logo
1 de 24
FOG
COMPUTING
J.HariPriyanka
(11G21A0546)
Presented by
Contents:
1.What is fog computing?
2.What is need for fog computing?
3.Limitations overcome from cloud.
4.Cloud v/s fog
5.Applications
6.conclusion
What is fog computing?
• Fog computing, also known as fogging/edge
computing, it is a model in which data,
processing and applications are concentrated in
devices at the network edge rather than existing
almost entirely in the cloud.
• The term "Fog Computing" was introduced by
the Cisco Systems as new model to ease wireless
data transfer to distributed devices int he
Internet of Things (IoT) network paradigm
• That concentration means that data can be
processed locally in smart devices rather than being
sent to the cloud for processing. Fog computing is
one approach to dealing with the demands of the
ever-increasing number of Internet-connected
devices sometimes referred to as the Internet of
Things (IoT).
Fog computing is a term for placing some of
transactions and resources at the edge of the
cloud, rather than establishing channels for cloud
storage and utilization. Fog computing reduces
the need for bandwidth by not sending every bit
of information over cloud channels, and instead
aggregating it at certain access points. By using
this kind of distributed strategy, we can lower
costs and improve efficiencies.
What is the need for fog computing?
• Fog Computing extends the cloud computing
paradigm to the edge of the network. While fog
and cloud use the same resources (networking,
compute, and storage) and share many of the
same mechanisms and attributes
(virtualization, multi-tenancy) the extension is a
non-trivial one in that there exist some
fundamental differences stemming from the
reason fog computing was developed: to address
applications and services that do not fit the
paradigm of the cloud
• Fog Computing Keeps Data Right Where the
Internet of Things Needs it
Limitations of cloud:
• cloud computing has so many advantages, it also
suffers from certain shortcomings too.
• High capacity(bandwidth)
• Client access link.
• High latency
• security
Limitations overcomes in fog:
• reduction in data movement across the network
resulting in reduced congestion
• elimination of bottlenecks resulting from
centralized computing systems
• improved security of encrypted data as it stays
closer to the end user
CLOUD VS FOG:
Requirement Cloud computing Fog computing
Latency high low
Delay jitter High Very low
Location of server nodes With in internet At the edge of local n/w
Distance between the clie
nt and server
Multiple hops One hop
Security Undefined Can be defined
Attack on data enrouter High probability Very Less probability
Location awareness No Yes
Requirement Cloud computing Fog computing
Geographicaldistribution Centralized Distributed
No. of server nodes Few Very large
Support for Mobility Limited Supported
Real time interactions Supported Supported
Type of last mile connecti
vity
Leased line Wireless
Continued………
Applications of fog:
• Tech giants Cisco and IBM are the driving forces
behind fog computing, and link their concept to
the emerging Internet of Things (IoT).
• Most of the buzz around fog has a direct
correlation with the emergence of the Internet of
Things (IoT)
Connected cars: Fog computing is ideal for Connected
Vehicles (CV) because real-time interactions will make
communications between cars, access points and traffic lights
as safe and efficient as possible
Smart grids: Fog computing allows fast,
machine-to-machine (M2M) handshakes and
human to machine interactions (HMI), which
would work in cooperation with the cloud
• Smart cities: Fog computing would be able to
obtain sensor data on all levels, and integrate all
the mutually independent network entities
within
• Health care: The cloud computing market for
healthcare is expected to reach $5.4 billion by
2017, and fog computing would allow this on a
more localized level.
Conclusion:Conclusion:
• fog computing will grow in helping the
emerging network paradigms that require
faster processing with less delay and delay ji
tter ,cloud computing would serve the
business community meeting their high end
computing demands lowering the cost based
on a utility pricing model
• REFERENCES:
• K.Hashizume, D.G. Rosado, E.Fernández-Medina,and E.B.
Fernandez, "An analysis of security issues for cloud
computing,"
• Journal of Internet Services and Applications
• , vol.4, no.5, pp. 1--13, 2013.
•
• M.M. Islam, S.Morshed, and P.Goswami, "Cloud computing:
A survey on its limitations and potential solutions,"
• International Journal of Computer Science Issues
• , vol.10, no.4, pp. 159--163, 2013.
•
• F.Bonomi, R.Milito, J.Zhu, and S.Addepalli, "Fog computing
and its role in the Internet of Things," in
• ACM SIGCOMM Workshop on Mobile cloud Computing
• , Helsinki, Finland, 2012, pp. 13--16
Thank you
Fog computing

Mais conteúdo relacionado

Mais procurados

Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 

Mais procurados (20)

Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing
Fog computingFog computing
Fog computing
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 

Destaque

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 

Destaque (12)

Utility Fog
Utility FogUtility Fog
Utility Fog
 
Utility fog ppt
Utility fog pptUtility fog ppt
Utility fog ppt
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Semelhante a Fog computing

Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 

Semelhante a Fog computing (20)

Fog Computing
Fog ComputingFog Computing
Fog Computing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Fog compute good
Fog compute goodFog compute good
Fog compute good
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Edge computing
Edge computingEdge computing
Edge computing
 
IoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing ModelIoT A Fog-Cloud Computing Model
IoT A Fog-Cloud Computing Model
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog computing
Fog computingFog computing
Fog computing
 

Último

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Último (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Fog computing

  • 2. Contents: 1.What is fog computing? 2.What is need for fog computing? 3.Limitations overcome from cloud. 4.Cloud v/s fog 5.Applications 6.conclusion
  • 3. What is fog computing? • Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. • The term "Fog Computing" was introduced by the Cisco Systems as new model to ease wireless data transfer to distributed devices int he Internet of Things (IoT) network paradigm
  • 4. • That concentration means that data can be processed locally in smart devices rather than being sent to the cloud for processing. Fog computing is one approach to dealing with the demands of the ever-increasing number of Internet-connected devices sometimes referred to as the Internet of Things (IoT).
  • 5. Fog computing is a term for placing some of transactions and resources at the edge of the cloud, rather than establishing channels for cloud storage and utilization. Fog computing reduces the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points. By using this kind of distributed strategy, we can lower costs and improve efficiencies.
  • 6.
  • 7. What is the need for fog computing? • Fog Computing extends the cloud computing paradigm to the edge of the network. While fog and cloud use the same resources (networking, compute, and storage) and share many of the same mechanisms and attributes (virtualization, multi-tenancy) the extension is a non-trivial one in that there exist some fundamental differences stemming from the reason fog computing was developed: to address applications and services that do not fit the paradigm of the cloud
  • 8. • Fog Computing Keeps Data Right Where the Internet of Things Needs it
  • 9. Limitations of cloud: • cloud computing has so many advantages, it also suffers from certain shortcomings too. • High capacity(bandwidth) • Client access link. • High latency • security
  • 10. Limitations overcomes in fog: • reduction in data movement across the network resulting in reduced congestion • elimination of bottlenecks resulting from centralized computing systems • improved security of encrypted data as it stays closer to the end user
  • 11. CLOUD VS FOG: Requirement Cloud computing Fog computing Latency high low Delay jitter High Very low Location of server nodes With in internet At the edge of local n/w Distance between the clie nt and server Multiple hops One hop Security Undefined Can be defined Attack on data enrouter High probability Very Less probability Location awareness No Yes
  • 12. Requirement Cloud computing Fog computing Geographicaldistribution Centralized Distributed No. of server nodes Few Very large Support for Mobility Limited Supported Real time interactions Supported Supported Type of last mile connecti vity Leased line Wireless Continued………
  • 13.
  • 14.
  • 15. Applications of fog: • Tech giants Cisco and IBM are the driving forces behind fog computing, and link their concept to the emerging Internet of Things (IoT). • Most of the buzz around fog has a direct correlation with the emergence of the Internet of Things (IoT)
  • 16. Connected cars: Fog computing is ideal for Connected Vehicles (CV) because real-time interactions will make communications between cars, access points and traffic lights as safe and efficient as possible
  • 17. Smart grids: Fog computing allows fast, machine-to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud
  • 18. • Smart cities: Fog computing would be able to obtain sensor data on all levels, and integrate all the mutually independent network entities within
  • 19. • Health care: The cloud computing market for healthcare is expected to reach $5.4 billion by 2017, and fog computing would allow this on a more localized level.
  • 20.
  • 21. Conclusion:Conclusion: • fog computing will grow in helping the emerging network paradigms that require faster processing with less delay and delay ji tter ,cloud computing would serve the business community meeting their high end computing demands lowering the cost based on a utility pricing model
  • 22. • REFERENCES: • K.Hashizume, D.G. Rosado, E.Fernández-Medina,and E.B. Fernandez, "An analysis of security issues for cloud computing," • Journal of Internet Services and Applications • , vol.4, no.5, pp. 1--13, 2013. • • M.M. Islam, S.Morshed, and P.Goswami, "Cloud computing: A survey on its limitations and potential solutions," • International Journal of Computer Science Issues • , vol.10, no.4, pp. 159--163, 2013. • • F.Bonomi, R.Milito, J.Zhu, and S.Addepalli, "Fog computing and its role in the Internet of Things," in • ACM SIGCOMM Workshop on Mobile cloud Computing • , Helsinki, Finland, 2012, pp. 13--16