Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
A SEMINAR ON
FOG COMPUTING
Presented By:
Ajay Dhanraj Sirsat
BE(CSE)
CSE Department,
DIEMS, Aurangabad.
1/5/2018
1
CONTENTS
 Existing System
 Proposed System
 Abstract
 Introduction
 Fog Architecture
 Characteristics of Fog
 Benefits of Fog
 Applications
 Conclusion
 References
1/5/2018
2
MAN-IN –THE-MIDDLE-ATTACK
 In this subsection, we take man- in-the-middle attack as an example to expose
the security problems in Fog computing. In this attack, gateways serving as Fog
devices may be compromised or replaced by fake ones .
1/5/2018
3
EXISTING SYSTEM
 Cloud computing has provided many opportunities for enterprises by offering their
customers a range of computing services. Current “pay-as- you-go” Cloud computing
model becomes an efficient alternative to owning and managing private data centers
for customers facing Web applications
1/5/2018
4
PROBLEMS ASSOCIATED WITH CLOUD
1/5/2018
5
PROPOSED SYSTEM
 Unlike traditional data centers, Fog devices are geographically distributed over
heterogeneous platforms, spanning multiple management domains.
 Cisco is interested in innovative proposals that facilitate service mobility across
platforms, and technologies.
 preserve end-user and content security and privacy across domains.
1/5/2018
6
ABSTRACT
 Fog Computing is a paradigm that extends Cloud computing and services to the
edge of the network. Similar to Cloud, Fog provides data, compute, storage, and
application services to end-users.
 The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid,
smart traffic lights in vehicular networks and software defined networks.
1/5/2018
7
1/5/2018
8
INTRODUCTION
 CISCO recently delivered the vision of fog computing to enable applications on
billions of connected devices to run directly at the network edge.
 Customers can develop, manage and run software applications on Cisco framework
of networked devices, including hardened routers and switches.
 Cisco brings the open source Linux and network operating system together in a
single networked device.
1/5/2018
9
CLOUD ARCHITECTURE BEFORE THE ADVENT OF
FOG TECHNOLOGY
1/5/2018
10
CLOUD ARCHITECTURE WITH THE ADVENT OF
FOG TECHNOLOGY
1/5/2018
11
FOG ARCHITECTURE
1/5/2018
12
CHARACTERISTICS OF FOG COMPUTING
 Edge location, location awareness, and low latency
 Geographical distribution : The services and application objective of the fog is widely
distributed.
 Support for mobility : Using LISP protocol fog devices provide mobility techniques like
decouple host identity to location identity
 Real time interactions : fog computing requires real time interactions for speedy service.
 Heterogeneity : Fog nodes can be deployed in a wide variety of environments.
 Interoperability : Fog components gives wide range of services like streaming.
1/5/2018
13
BENEFITS OF USING FOG COMPUTING:
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of- services (QoS)
and real time applications.
1/5/2018
14
APPLICATIONS OF FOG
 Internet of Things (IoT).
 Connected cars
 Smart grids
 Decentralized Smart Building Control
 Smart Cities
 Health Care
1/5/2018
15
CONCLUSION:
 Fog computing advantages for services in several domains, such as Smart Grid,
wireless sensor networks, Internet of Things (IoT) and software defined networks
(SDNs).
 We examine the state- of-the-art and disclose some general issues in Fog
computing including security, privacy, trust, and service migration among Fog
devices and between Fog and Cloud.
1/5/2018
16
REFERENCES
 F. Bonomi, “Connected vehicles, the internet of things, and fog com- putting,” in
The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las
Vegas, USA, 2011.
 F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the
internet of things,” in Proceedings of the First Edition of the MCC Workshop on
Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
 https://en.wikipedia.org/wiki/Fog_computing
 https://techcrunch.com/2016/08/02/how-fog-computing-pushes-iot-intelligence-to-
the-edge/
1/5/2018
17
1/5/2018
18

More Related Content

Introduction to Fog Computing

  • 1. A SEMINAR ON FOG COMPUTING Presented By: Ajay Dhanraj Sirsat BE(CSE) CSE Department, DIEMS, Aurangabad. 1/5/2018 1
  • 2. CONTENTS  Existing System  Proposed System  Abstract  Introduction  Fog Architecture  Characteristics of Fog  Benefits of Fog  Applications  Conclusion  References 1/5/2018 2
  • 3. MAN-IN –THE-MIDDLE-ATTACK  In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones . 1/5/2018 3
  • 4. EXISTING SYSTEM  Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as- you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications 1/5/2018 4
  • 5. PROBLEMS ASSOCIATED WITH CLOUD 1/5/2018 5
  • 6. PROPOSED SYSTEM  Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains.  Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies.  preserve end-user and content security and privacy across domains. 1/5/2018 6
  • 7. ABSTRACT  Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users.  The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. 1/5/2018 7
  • 9. INTRODUCTION  CISCO recently delivered the vision of fog computing to enable applications on billions of connected devices to run directly at the network edge.  Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches.  Cisco brings the open source Linux and network operating system together in a single networked device. 1/5/2018 9
  • 10. CLOUD ARCHITECTURE BEFORE THE ADVENT OF FOG TECHNOLOGY 1/5/2018 10
  • 11. CLOUD ARCHITECTURE WITH THE ADVENT OF FOG TECHNOLOGY 1/5/2018 11
  • 13. CHARACTERISTICS OF FOG COMPUTING  Edge location, location awareness, and low latency  Geographical distribution : The services and application objective of the fog is widely distributed.  Support for mobility : Using LISP protocol fog devices provide mobility techniques like decouple host identity to location identity  Real time interactions : fog computing requires real time interactions for speedy service.  Heterogeneity : Fog nodes can be deployed in a wide variety of environments.  Interoperability : Fog components gives wide range of services like streaming. 1/5/2018 13
  • 14. BENEFITS OF USING FOG COMPUTING:  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services (QoS) and real time applications. 1/5/2018 14
  • 15. APPLICATIONS OF FOG  Internet of Things (IoT).  Connected cars  Smart grids  Decentralized Smart Building Control  Smart Cities  Health Care 1/5/2018 15
  • 16. CONCLUSION:  Fog computing advantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs).  We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud. 1/5/2018 16
  • 17. REFERENCES  F. Bonomi, “Connected vehicles, the internet of things, and fog com- putting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011.  F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.  https://en.wikipedia.org/wiki/Fog_computing  https://techcrunch.com/2016/08/02/how-fog-computing-pushes-iot-intelligence-to- the-edge/ 1/5/2018 17