0% found this document useful (0 votes)
9 views19 pages

Technical Seminar

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views19 pages

Technical Seminar

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

MOODLAKATTE INSTITUTE OF TECHNOLOGY, KUNDAPURA

Department of Computer Science & Engineering

Technical Seminar (18CSS84) Presentation


on
“FOG COMPUTING”

Presented by
Suryanarayan Ishwar Kunabi
4MK20CS043

Under the guidance of


Mrs. Sookshma Adiga
Contents
 Introduction
 What is fog computing ?
 Why Fog ?
 Characteristics
 Architecture
 Working
 Limitation of cloud
 Fog vs Cloud
 Advantages
 Disadvantages
 Applications
 Conclusion
 References
Introduction

• Fog computing", also known as fogging/edge computing, it is a


model in which data, processing and applications are concentrated
in devices at the network edge rather than existing almost entirely in
the cloud.

• The term "Fog Computing" was introduced by the Cisco Systems as


new model to ease wireless data transfer to distributed devices in
the Internet of Things (IoT) network paradigm.
What is fog computing ?

• Fog computing is a decentralized computing paradigm situated at the


edge of the network.

• It processes data closer to its source, reducing latency and bandwidth


consumption.

• Fog nodes act as an intermediary layer between cloud data centers and
end-user devices.
Why Fog ?
• Fog computing was developed to address applications and services that
do not fit the paradigm of the cloud.
• Fog Computing keeps data right where the Internet of Things needs it.
• Existing data protection mechanisms in Cloud Computing such as
encryption failed in securing the data from the attackers.
• Limitations of cloud (high latency, security shortcomings,
bandwidth, etc.)
Characteristics

• low latency
• Geographical distribution
• Support for mobility
• Real time interactions
• Heterogeneity
• Interoperability
Architecture
Working
Data Generation: Imagine a network of devices like sensors, cameras, or
industrial machines. These devices constantly generate data.

Fog Nodes Take Over: Instead of sending all this data directly to the cloud, it
gets routed to fog nodes. These fog nodes can be local servers, micro-data
centers, or even intelligent devices with processing capabilities.

Local Processing: Fog nodes analyze and process the data locally. This can
involve filtering out irrelevant information, performing basic calculations, or
making preliminary decisions.
• Smart Filtering: Only the most critical data or data requiring further
analysis gets forwarded to the cloud. This reduces the amount of data
traveling long distances, saving bandwidth and speeding up overall
processing.

• Decision-Making: Fog nodes can also be programmed to make real-time


decisions based on the processed data.

• Cloud Collaboration: Fog nodes can send processed data or specific


requests to the cloud for advanced analytics, long-term storage, or
collaboration with other applications.

• Management and Security: It ensures communication between fog nodes,


the cloud, and devices, maintaining security and monitoring performance.
Limitations of Cloud

• Cloud computing has so many advantages, it


also suffers from certain shortcomings too..
• High capacity(bandwidth)
• Client access link
• High latency Security
Cloud vs Fog
Requirement Cloud computing Fog computing
Latency High Low

Delay jitter High Very low

Location of server nodes With in internet At the edge of local network

Distance b/w the client and Multiple network One hop


network
Security Less security High security

Geographical distribution centralized Distributed

No. of server nodes Few Very large


Advantages
• Increased Scalability: Fog computing architectures are inherently scalable. Additional
fog nodes can be easily deployed at the network edge to handle growing data volumes or
expand processing capabilities.

• Offline Functionality: Certain fog computing systems can operate even when
disconnected from the cloud. This ensures continued functionality.

• Cost Savings: Reduced reliance on the cloud for processing tasks can lead to cost
savings in terms of bandwidth usage and cloud storage fees.

• Improved Reliability: Distributing processing power across fog nodes enhances overall
system reliability. Even if one fog node experiences an issue, others can continue
operating, minimizing downtime and maintaining application functionality.
Disadvantages
• Increased Complexity: Implementing and managing a fog computing architecture can be
more complex compared to traditional cloud-based solutions.

• Limited Resources: Fog nodes typically have less processing power and storage capacity
compared to centralized cloud data centers.

• Higher Initial Investment: Deploying fog nodes and setting up the necessary
infrastructure requires an initial investment in hardware and software. This can be a barrier
for some organizations, especially for smaller deployments.

• Security Concerns: Distributing data and processing across multiple fog nodes
introduces new security challenges. Securing each node, managing access control, and
preventing cyberattacks require careful planning and robust security measures.
• Management Overhead: Constantly monitoring and managing the
performance, health, and security of fog nodes can add to the overall IT
management burden for organizations.

• Physical Security: Fog nodes are often deployed in physical locations,


making them vulnerable to physical theft or tampering. Implementing
appropriate physical security measures is crucial.

• Vendor Lock-In: Choosing a specific fog computing vendor might lead to


vendor lock-in, where switching to another vendor later becomes difficult and
expensive due to proprietary technologies or systems.
Applications
• Traffic management: Fog computing can analyze traffic data and optimize
traffic light timings in real-time, reducing congestion and improving traffic
flow.

• Environmental monitoring: Fog nodes can collect data from air and water
quality sensors, enabling real-time monitoring and faster response to
environmental issues.

• Waste management: Smart bins equipped with fog nodes can optimize waste
collection routes and improve efficiency.
• Real-time decision-making: Fog nodes can process sensor data
from autonomous vehicles in real-time, enabling them to react
quickly to changing road conditions and obstacles

• Supply chain optimization: Monitoring product movement and


location through fog nodes can improve supply chain efficiency and
visibility.

• Quality control: In Industrial Automation and Manufacturing real-


time data from sensors can be used for on-the-spot quality control
checks, ensuring product consistency.
Conclusion

Fog computing will grow in helping the emerging network


paradigms that require faster processing with less delay and delay
jitter, cloud computing would serve the business community
meeting their high end computing demands lowering the cost based
on a utility pricing model.
References

• www.google.com
• www.cisco.com
• www.wikipedia.com
THANK YOU

You might also like