SlideShare a Scribd company logo
FOG Computing
What is Fog computing ?
 Fog Computing is the term coined by Cisco that refers to extending cloud
computing to an edge of the enterprise’s network. Thus, it is also known as
Edge Computing or Fogging. It facilitates the operation of computing, storage,
and networking services between end devices and computing data centers.
1. The devices comprising the fog infrastructure are known as fog nodes.
2. In fog computing, all the storage capabilities, computation capabilities, data
along with the applications are placed between the cloud and the physical host.
3. All these functionalities are placed more towards the host. This makes
processing faster as it is done almost at the place where data is created.
4. It improves the efficiency of the system and is also used to ensure increased
security.
When to use fog computing?
1. It is used when only selected data is required to send to the cloud. This
selected data is chosen for long-term storage and is less frequently
accessed by the host.
2. It is used when the data should be analyzed within a fraction of seconds i.e
Latency should be low.
3. It is used whenever a large number of services need to be provided over a
large area at different geographical locations.
4. Devices that are subjected to rigorous computations and processings must
use fog computing.
5. Real-world examples where fog computing is used are in IoT devices (eg.
Car-to-Car Consortium, Europe), Devices with Sensors, Cameras (IIoT-
Industrial Internet of Things), etc
Advantages of fog computing.
• This approach reduces the amount of data that needs to be sent to the
cloud.
• Since the distance to be traveled by the data is reduced, it results in saving
network bandwidth.
• Reduces the response time of the system.
• It improves the overall security of the system as the data resides close to
the host.
• It provides better privacy as industries can perform analysis on their data
locally.
Disadvantages of fog computing.
• Congestion may occur between the host and the fog node due to
increased traffic (heavy data flow).
• Power consumption increases when another layer is placed between the
host and the cloud.
• Scheduling tasks between host and fog nodes along with fog nodes and
the cloud is difficult.
• Data management becomes tedious as along with the data stored and
computed, the transmission of data involves encryption-decryption too
which in turn release data.
Applications of fog computing.
• It can be used to monitor and analyze the patients’ condition. In case of
emergency, doctors can be alerted.
• It can be used for real-time rail monitoring as for high-speed trains we
want as little latency as possible.
• It can be used for gas and oils pipeline optimization. It generates a huge
amount of data and it is inefficient to store all data into the cloud for
analysis.
Challenges of fog computing
Authentication and Trust issues
 Authentication is one of the most concerning issues of fog computing since
these services are offered at a large scale.
 Fog service providers can be different parties like cloud service providers,
internet service providers, and end-users.
Privacy
 Privacy concerns are always there when there are many networks involved.
Since fog computing is based on wireless technology, there is a huge concern
regarding network privacy.
 There are so many fog nodes that each end-user is accessible to them, and
because of this, more sensitive information passes from end-users to the fog
nodes.
Challenges of fog computing.
Security
 Fog computing security issues arise as there are many devices connected
to fog nodes and at different gateways.
 Each device has a different IP address, and any hacker can fake your IP
address to gain access to your personal information that is stored in that
particular fog node.
Energy consumption
 Energy consumption is very high in fog computing as the number of fog
nodes present in the fog environment is high and requires energy to work.

More Related Content

PDF
fog computing related to cyber securityf
Prathmeshnawale2
 
PPTX
FOG COMPUTING-2.pptx fog computing ppt on internship
vikram889345
 
PDF
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
PPTX
Fog comuting
TalhaMuhammad27
 
PDF
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
PPT
FG2-1 fog computing in cloud computing.ppt
Pavani839789
 
PPTX
semppt.pptx
panvalkarchaitali
 
PPTX
Fog computing
Hari Priyanka
 
fog computing related to cyber securityf
Prathmeshnawale2
 
FOG COMPUTING-2.pptx fog computing ppt on internship
vikram889345
 
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
Fog comuting
TalhaMuhammad27
 
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
FG2-1 fog computing in cloud computing.ppt
Pavani839789
 
semppt.pptx
panvalkarchaitali
 
Fog computing
Hari Priyanka
 

Similar to fog computing is an IBM Convept of foundation of computer science.pptx (20)

PPTX
semppt.pptx
panvalkarchaitali
 
PPTX
semppt.pptx
panvalkarchaitali
 
PDF
' 'FOG COMPUTING.pdf and it is useful for ucha
naveenarjun400
 
PDF
FOG COMPUTING is and excitement development
naveenarjun400
 
PPTX
Fogcomputing and advantages of fog .pptx
premswapna2015
 
PPTX
Fog Computing
Manoj Mandava
 
PPTX
Fog Computing: What, How and Why [Shakeeb A.]
Shakeeb Ahmad Mohammad Mukhtar
 
PPTX
Presentation (2).pptxxxxxxxxxxxxxxxxxxxx
kousarunnisa66
 
PPTX
Fog computing
Pachipulusu Giridhar
 
PPTX
Fog Computing
Pachipulusu Giridhar
 
PDF
Fog Computing
IRJET Journal
 
DOCX
Seminar report
archana lisbon
 
DOCX
Fog Computing and Cloud Computing
Ahmed Banafa
 
PPTX
Fog computing : The new age Technology
Prankit Mishra
 
PPT
FG2.ppt
TapasDash11
 
PDF
Fog-Computing-Bringing-the-Cloud-Closer.
srinadhpasham940
 
PPTX
FG2.pptx
panvalkarchaitali
 
PDF
Fog Computing An Empirical Study
ijtsrd
 
PDF
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
PDF
Brief Introduction to Fog computing.pdf
annappa11
 
semppt.pptx
panvalkarchaitali
 
semppt.pptx
panvalkarchaitali
 
' 'FOG COMPUTING.pdf and it is useful for ucha
naveenarjun400
 
FOG COMPUTING is and excitement development
naveenarjun400
 
Fogcomputing and advantages of fog .pptx
premswapna2015
 
Fog Computing
Manoj Mandava
 
Fog Computing: What, How and Why [Shakeeb A.]
Shakeeb Ahmad Mohammad Mukhtar
 
Presentation (2).pptxxxxxxxxxxxxxxxxxxxx
kousarunnisa66
 
Fog computing
Pachipulusu Giridhar
 
Fog Computing
Pachipulusu Giridhar
 
Fog Computing
IRJET Journal
 
Seminar report
archana lisbon
 
Fog Computing and Cloud Computing
Ahmed Banafa
 
Fog computing : The new age Technology
Prankit Mishra
 
FG2.ppt
TapasDash11
 
Fog-Computing-Bringing-the-Cloud-Closer.
srinadhpasham940
 
Fog Computing An Empirical Study
ijtsrd
 
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
Brief Introduction to Fog computing.pdf
annappa11
 
Ad

Recently uploaded (20)

PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Zero Carbon Building Performance standard
BassemOsman1
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Information Retrieval and Extraction - Module 7
premSankar19
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Ad

fog computing is an IBM Convept of foundation of computer science.pptx

  • 2. What is Fog computing ?  Fog Computing is the term coined by Cisco that refers to extending cloud computing to an edge of the enterprise’s network. Thus, it is also known as Edge Computing or Fogging. It facilitates the operation of computing, storage, and networking services between end devices and computing data centers. 1. The devices comprising the fog infrastructure are known as fog nodes. 2. In fog computing, all the storage capabilities, computation capabilities, data along with the applications are placed between the cloud and the physical host. 3. All these functionalities are placed more towards the host. This makes processing faster as it is done almost at the place where data is created. 4. It improves the efficiency of the system and is also used to ensure increased security.
  • 3. When to use fog computing? 1. It is used when only selected data is required to send to the cloud. This selected data is chosen for long-term storage and is less frequently accessed by the host. 2. It is used when the data should be analyzed within a fraction of seconds i.e Latency should be low. 3. It is used whenever a large number of services need to be provided over a large area at different geographical locations. 4. Devices that are subjected to rigorous computations and processings must use fog computing. 5. Real-world examples where fog computing is used are in IoT devices (eg. Car-to-Car Consortium, Europe), Devices with Sensors, Cameras (IIoT- Industrial Internet of Things), etc
  • 4. Advantages of fog computing. • This approach reduces the amount of data that needs to be sent to the cloud. • Since the distance to be traveled by the data is reduced, it results in saving network bandwidth. • Reduces the response time of the system. • It improves the overall security of the system as the data resides close to the host. • It provides better privacy as industries can perform analysis on their data locally.
  • 5. Disadvantages of fog computing. • Congestion may occur between the host and the fog node due to increased traffic (heavy data flow). • Power consumption increases when another layer is placed between the host and the cloud. • Scheduling tasks between host and fog nodes along with fog nodes and the cloud is difficult. • Data management becomes tedious as along with the data stored and computed, the transmission of data involves encryption-decryption too which in turn release data.
  • 6. Applications of fog computing. • It can be used to monitor and analyze the patients’ condition. In case of emergency, doctors can be alerted. • It can be used for real-time rail monitoring as for high-speed trains we want as little latency as possible. • It can be used for gas and oils pipeline optimization. It generates a huge amount of data and it is inefficient to store all data into the cloud for analysis.
  • 7. Challenges of fog computing Authentication and Trust issues  Authentication is one of the most concerning issues of fog computing since these services are offered at a large scale.  Fog service providers can be different parties like cloud service providers, internet service providers, and end-users. Privacy  Privacy concerns are always there when there are many networks involved. Since fog computing is based on wireless technology, there is a huge concern regarding network privacy.  There are so many fog nodes that each end-user is accessible to them, and because of this, more sensitive information passes from end-users to the fog nodes.
  • 8. Challenges of fog computing. Security  Fog computing security issues arise as there are many devices connected to fog nodes and at different gateways.  Each device has a different IP address, and any hacker can fake your IP address to gain access to your personal information that is stored in that particular fog node. Energy consumption  Energy consumption is very high in fog computing as the number of fog nodes present in the fog environment is high and requires energy to work.