fog computing ppt
TRANSCRIPT
![Page 1: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/1.jpg)
Technical Seminar on
FOG COMPUTINGUnder the Guidance of P.V.R.K.MURTHY, M.Tech
Assistant Professor
Presented By
![Page 2: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/2.jpg)
CONTENTS
Introduction Limitations overcome from cloud Limitations overcome in fog Existing System Proposed System Advantages Disadvantages Conclusion
![Page 3: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/3.jpg)
• Fog computing, also known as fogging/edge computing, it is a
model in which data, processing and applications are
concentrated in devices at the network edge rather than
existing almost entirely in the cloud.
• The term "Fog Computing" was introduced by the Cisco
Systems .
INTRODUCTION
![Page 4: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/4.jpg)
• CISCO recently delivered the vision of fog computing to enable
applications on billions of connected devices to run directly at the
network edge. Customers can develop, manage and run software
applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux
and network operating system together in a single networked device.
![Page 5: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/5.jpg)
Cloud
Fog
Core
Locations
Edge
Simple three level hierarchy
![Page 6: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/6.jpg)
• cloud computing has so many advantages, it also suffers from
certain shortcomings too.
• High capacity(bandwidth)
• Client access link.
• High latency
• security
Limitations over from cloud
![Page 7: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/7.jpg)
• Reduction in data movement across the network
resulting in reduced congestion
• Elimination of bottlenecks resulting from centralized
computing systems
• Improved security of encrypted data as it stays closer
to the end user
Limitations overcome in FOG
![Page 8: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/8.jpg)
• Cloud computing has provided many opportunities for
enterprises by offering their customers a range of computing
services. Current “pay-as-you-go” Cloud computing model
becomes an efficient alternative to owning and managing private
data centers for customers facing Web applications
EXISTING SYSTEM
![Page 9: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/9.jpg)
• Unlike traditional data centers, Fog devices
are geographically distributed over
heterogeneous platforms, spanning multiple
management domains. Cisco is interested in
innovative proposals that facilitate service
mobility across platforms, and technologies
that preserve end-user and content security
and privacy across domains.
PROPOSED SYSTEM
![Page 10: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/10.jpg)
![Page 11: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/11.jpg)
• Fog can be distinguished from Cloud by its proximity to end-
users.
• The dense geographical distribution and its support for
mobility.
• It provides low latency, location awareness, and improves
quality-of-services (QoS) and real time applications.
ADVANTAGES
![Page 12: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/12.jpg)
• Existing data protection mechanisms such as encryption was
failed in securing the data from the attackers.
• It does not verify whether the user was authorized or not.
• Cloud computing security does not focus on ways of secure
the data from unauthorized access.
DISADVANTAGES
![Page 13: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/13.jpg)
• Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other.
• Next, Fog computing based SDN in vehicular networks will receive due attention.
FUTURE ENCHANCEMENT
![Page 14: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/14.jpg)
• Fog computing advantages for services in several
domains, such as Smart Grid, wireless sensor networks,
Internet of Things (IoT) and software defined networks
(SDNs). We examine the state- of-the-art and disclose some
general issues in Fog computing including security, privacy,
trust, and service migration among Fog devices and between
Fog and Cloud.
CONCLUSION
![Page 15: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/15.jpg)
[1] F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011.[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
REFERENCES
![Page 16: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/16.jpg)
![Page 17: fog computing ppt](https://reader036.vdocuments.net/reader036/viewer/2022083119/58719e301a28ab044e8b63f1/html5/thumbnails/17.jpg)