Technical Seminar
on
FOG COMPUTING
Under the Guidance of
P.V.R.K.MURTHY, M.Tech
Assistant Professor
Presented By
CONTENTS
 Introduction
 Limitations overcome from cloud
 Limitations overcome in fog
 Existing System
 Proposed System
 Advantages
 Disadvantages
 Conclusion
• Fog computing, also known as fogging/edge computing, it is a
model in which data, processing and applications are
concentrated in devices at the network edge rather than
existing almost entirely in the cloud.
• The term "Fog Computing" was introduced by the Cisco
Systems .
INTRODUCTION
• CISCO recently delivered the vision of fog computing to enable
applications on billions of connected devices to run directly at the
network edge. Customers can develop, manage and run software
applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux
and network operating system together in a single networked device.
Cloud
Fog
Cor
e
Locations
Edge
Simple three level hierarchy
• cloud computing has so many advantages, it also suffers from
certain shortcomings too.
• High capacity(bandwidth)
• Client access link.
• High latency
• security
Limitations over from cloud
• Reduction in data movement across the network
resulting in reduced congestion
• Elimination of bottlenecks resulting from centralized
computing systems
• Improved security of encrypted data as it stays closer
to the end user
Limitations overcome in FOG
• Cloud computing has provided many opportunities for
enterprises by offering their customers a range of computing
services. Current “pay-as-you-go” Cloud computing model
becomes an efficient alternative to owning and managing private
data centers for customers facing Web applications
EXISTING SYSTEM
• Unlike traditional data centers, Fog
devices are geographically distributed
over heterogeneous platforms, spanning
multiple management domains. Cisco is
interested in innovative proposals that
facilitate service mobility across
platforms, and technologies that
preserve end-user and content security
and privacy across domains.
PROPOSED SYSTEM
• Fog can be distinguished from Cloud by its proximity to end-
users.
• The dense geographical distribution and its support for
mobility.
• It provides low latency, location awareness, and improves
quality-of-services (QoS) and real time applications.
ADVANTAGES
• Existing data protection mechanisms such as encryption was
failed in securing the data from the attackers.
• It does not verify whether the user was authorized or not.
• Cloud computing security does not focus on ways of secure
the data from unauthorized access.
DISADVANTAGES
• Future work will expand on the Fog computing paradigm in
Smart Grid. In this scenario, two models for Fog devices can
be developed. Independent Fog devices consult directly with
the Cloud for periodic updates on price and demands, while
interconnected Fog devices may consult each other.
• Next, Fog computing based SDN in vehicular networks will
receive due attention.
FUTURE ENCHANCEMENT
• Fog computing advantages for services in several
domains, such as Smart Grid, wireless sensor networks,
Internet of Things (IoT) and software defined networks
(SDNs). We examine the state- of-the-art and disclose some
general issues in Fog computing including security, privacy,
trust, and service migration among Fog devices and between
Fog and Cloud.
CONCLUSION
[1] F. Bonomi, “Connected vehicles, the internet of things,
and fog com- puting,” in The Eighth ACM International
Workshop on Vehicular Inter- Networking (VANET), Las
Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog
computing and its role in the internet of things,” in
Proceedings of the First Edition of the MCC Workshop on
Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp.
13–16.
REFERENCES
fog computing ppt
fog computing ppt

fog computing ppt

  • 1.
    Technical Seminar on FOG COMPUTING Underthe Guidance of P.V.R.K.MURTHY, M.Tech Assistant Professor Presented By
  • 2.
    CONTENTS  Introduction  Limitationsovercome from cloud  Limitations overcome in fog  Existing System  Proposed System  Advantages  Disadvantages  Conclusion
  • 3.
    • Fog computing,also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. • The term "Fog Computing" was introduced by the Cisco Systems . INTRODUCTION
  • 4.
    • CISCO recentlydelivered the vision of fog computing to enable applications on billions of connected devices to run directly at the network edge. Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches. Cisco brings the open source Linux and network operating system together in a single networked device.
  • 5.
  • 6.
    • cloud computinghas so many advantages, it also suffers from certain shortcomings too. • High capacity(bandwidth) • Client access link. • High latency • security Limitations over from cloud
  • 7.
    • Reduction indata movement across the network resulting in reduced congestion • Elimination of bottlenecks resulting from centralized computing systems • Improved security of encrypted data as it stays closer to the end user Limitations overcome in FOG
  • 8.
    • Cloud computinghas provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as-you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications EXISTING SYSTEM
  • 9.
    • Unlike traditionaldata centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains. PROPOSED SYSTEM
  • 11.
    • Fog canbe distinguished from Cloud by its proximity to end- users. • The dense geographical distribution and its support for mobility. • It provides low latency, location awareness, and improves quality-of-services (QoS) and real time applications. ADVANTAGES
  • 12.
    • Existing dataprotection mechanisms such as encryption was failed in securing the data from the attackers. • It does not verify whether the user was authorized or not. • Cloud computing security does not focus on ways of secure the data from unauthorized access. DISADVANTAGES
  • 13.
    • Future workwill expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other. • Next, Fog computing based SDN in vehicular networks will receive due attention. FUTURE ENCHANCEMENT
  • 14.
    • Fog computingadvantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs). We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud. CONCLUSION
  • 15.
    [1] F. Bonomi,“Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. [2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16. REFERENCES