SlideShare a Scribd company logo
FOG COMPUTING
BY
Nagarjun N
U03MB21S0123
CONTENTS:
1. DEFINTION
2. COMPONENTS
3. BEST PRACTICES
4. TYPES
5. ARCHITECTURE
6. PROS AND CONS
7. APPLICATIONS
8. CONCLUSION
DEFINITION
Fog computing is a type of computing where data and
applications are stored and processed closer to the devices
that generate the data, rather than in a centralized cloud.
Introduced by Cisco, this approach helps improve the
performance and efficiency of cloud computing by
handling tasks locally, closer to the source of the data. It's
also known as fogging or edge computing and ensures
smooth operation between your devices and big data
centers.
1. Physical & virtual nodes (end devices): These devices are data generators
and can span a large spectrum of technology.
2. Fog nodes: Fog nodes are independent devices that pick up the generated
information.
3. Monitoring services: Monitoring services usually include application
programming interfaces (APIs) that keep track of the system’s performance and
resource availability.
4. Data processors: Data processors are programs that run on fog nodes.
5. Resource manager: Fog computing consists of independent nodes that must
work in a synchronized manner.
6. Security tools: Security must be built into the system even at the ground
level.
7. Applications: Applications provide actual services to end-users.
Top 10 Fog Computing Best Practices to Follow
Four Types of Fog Computing.
The four main types of fog computing are mentioned below.
•Device-level fog computing runs on devices such as sensors, switches, routers, and other low-powered hardware.
It can be used to gather data from these devices and send it to the cloud for analysis.
•Edge-level fog computing runs on servers or appliances located at the edge of a network. These devices can be
used to process data before it is sent to the cloud.
•Gateway-level fog computing runs on devices that act as a gateway between the edge and the cloud. These
devices can be used to manage traffic and ensure that only relevant data is sent to the cloud.
•Cloud-level fog computing runs on servers or appliances located in the cloud. These devices can be used to
process data before it is sent to end users.
Hierarchical Fog Computing Architecture
•IoT layer: This layer comprises IoT devices, such as sensors
or smartphones.
•Fog layer: Composing many fog nodes, this layer is the core
of the fog computing architecture.
•Cloud layer: This layer is mainly composed of the
centralized cloud infrastructure.
ADVANTAGES
➢ Privacy
Fog computing can be used to control the extent of privacy
➢ Productivity
If customer needs to make the machine function according to the way they want, they can utilize fog applications.
➢ Security
Fog computing has the capability to connect multiple devices to the same network.
➢ Bandwidth
The bandwidth required for transmitting data can be expensive depending upon the resources
➢ Latency
Another benefit of processing selected data locally is the latency savings.
DISADVANTAGES
➢ Complexity
Due to its complexity, the concept of Fog computing can be difficult to understand.
➢ Power Consumption
The number of fog nodes present in a fog environment is directly proportional to the energy consumption of
them.
➢ Deployment and Configuration Complexity:
Deploying fog nodes in diverse and potentially remote locations can be logistically challenging.
➢ Maintenance
Unlike cloud architecture, where maintenance is made seamless, it is not so in fog.
FOG COMPUTING USE CASES
Even though fog computing is anticipated to grow at a rapid rate, it is still a technology that is most
popular within industries that need data close to the network edge.
•Hospitality
•Retail
•Wearables
•Smart buildings
•Agriculture
•Government
•Military
Fog computing is an exciting development in technology that addresses the need for data processing and
storage closer to the data source, such as sensors and smart devices, rather than relying solely on
centralized data centers.
By placing computation and data storage at the edge of the network, fog computing significantly
reduces latency and improves performance for tasks that require real-time responses. This is particularly
beneficial for applications in smart cities, healthcare, industrial automation, and the Internet of Things
(IoT), where rapid data processing and minimal delay are critical.
CONCLUSION
THANK YOU
Ad

More Related Content

Similar to ' 'FOG COMPUTING.pdf and it is useful for ucha (20)

A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
fog computing is an IBM Convept of foundation of computer science.pptx
fog computing is an IBM Convept of foundation of computer science.pptxfog computing is an IBM Convept of foundation of computer science.pptx
fog computing is an IBM Convept of foundation of computer science.pptx
Prathmeshnawale2
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
FG2-1 fog computing in cloud computing.ppt
FG2-1 fog computing in cloud computing.pptFG2-1 fog computing in cloud computing.ppt
FG2-1 fog computing in cloud computing.ppt
Pavani839789
 
Fog-Computing-Bringing-the-Cloud-Closer.
Fog-Computing-Bringing-the-Cloud-Closer.Fog-Computing-Bringing-the-Cloud-Closer.
Fog-Computing-Bringing-the-Cloud-Closer.
srinadhpasham940
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
RemoMarconzini1
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
SachuS16
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
Introduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdfIntroduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
Edge computing
Edge computingEdge computing
Edge computing
AbhayDhupar
 
Fogcomputing and advantages of fog .pptx
Fogcomputing and advantages of fog .pptxFogcomputing and advantages of fog .pptx
Fogcomputing and advantages of fog .pptx
premswapna2015
 
What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentation
HarshDixit68
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
fog computing is an IBM Convept of foundation of computer science.pptx
fog computing is an IBM Convept of foundation of computer science.pptxfog computing is an IBM Convept of foundation of computer science.pptx
fog computing is an IBM Convept of foundation of computer science.pptx
Prathmeshnawale2
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
FG2-1 fog computing in cloud computing.ppt
FG2-1 fog computing in cloud computing.pptFG2-1 fog computing in cloud computing.ppt
FG2-1 fog computing in cloud computing.ppt
Pavani839789
 
Fog-Computing-Bringing-the-Cloud-Closer.
Fog-Computing-Bringing-the-Cloud-Closer.Fog-Computing-Bringing-the-Cloud-Closer.
Fog-Computing-Bringing-the-Cloud-Closer.
srinadhpasham940
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
SachuS16
 
Introduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdfIntroduction to Edge and Fog Computing.pdf
Introduction to Edge and Fog Computing.pdf
Hitesh Mohapatra
 
Fogcomputing and advantages of fog .pptx
Fogcomputing and advantages of fog .pptxFogcomputing and advantages of fog .pptx
Fogcomputing and advantages of fog .pptx
premswapna2015
 
What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentation
HarshDixit68
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 

Recently uploaded (20)

SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Ad

' 'FOG COMPUTING.pdf and it is useful for ucha

  • 2. CONTENTS: 1. DEFINTION 2. COMPONENTS 3. BEST PRACTICES 4. TYPES 5. ARCHITECTURE 6. PROS AND CONS 7. APPLICATIONS 8. CONCLUSION
  • 3. DEFINITION Fog computing is a type of computing where data and applications are stored and processed closer to the devices that generate the data, rather than in a centralized cloud. Introduced by Cisco, this approach helps improve the performance and efficiency of cloud computing by handling tasks locally, closer to the source of the data. It's also known as fogging or edge computing and ensures smooth operation between your devices and big data centers.
  • 4. 1. Physical & virtual nodes (end devices): These devices are data generators and can span a large spectrum of technology. 2. Fog nodes: Fog nodes are independent devices that pick up the generated information. 3. Monitoring services: Monitoring services usually include application programming interfaces (APIs) that keep track of the system’s performance and resource availability. 4. Data processors: Data processors are programs that run on fog nodes. 5. Resource manager: Fog computing consists of independent nodes that must work in a synchronized manner. 6. Security tools: Security must be built into the system even at the ground level. 7. Applications: Applications provide actual services to end-users.
  • 5. Top 10 Fog Computing Best Practices to Follow
  • 6. Four Types of Fog Computing. The four main types of fog computing are mentioned below. •Device-level fog computing runs on devices such as sensors, switches, routers, and other low-powered hardware. It can be used to gather data from these devices and send it to the cloud for analysis. •Edge-level fog computing runs on servers or appliances located at the edge of a network. These devices can be used to process data before it is sent to the cloud. •Gateway-level fog computing runs on devices that act as a gateway between the edge and the cloud. These devices can be used to manage traffic and ensure that only relevant data is sent to the cloud. •Cloud-level fog computing runs on servers or appliances located in the cloud. These devices can be used to process data before it is sent to end users.
  • 7. Hierarchical Fog Computing Architecture •IoT layer: This layer comprises IoT devices, such as sensors or smartphones. •Fog layer: Composing many fog nodes, this layer is the core of the fog computing architecture. •Cloud layer: This layer is mainly composed of the centralized cloud infrastructure.
  • 8. ADVANTAGES ➢ Privacy Fog computing can be used to control the extent of privacy ➢ Productivity If customer needs to make the machine function according to the way they want, they can utilize fog applications. ➢ Security Fog computing has the capability to connect multiple devices to the same network. ➢ Bandwidth The bandwidth required for transmitting data can be expensive depending upon the resources ➢ Latency Another benefit of processing selected data locally is the latency savings.
  • 9. DISADVANTAGES ➢ Complexity Due to its complexity, the concept of Fog computing can be difficult to understand. ➢ Power Consumption The number of fog nodes present in a fog environment is directly proportional to the energy consumption of them. ➢ Deployment and Configuration Complexity: Deploying fog nodes in diverse and potentially remote locations can be logistically challenging. ➢ Maintenance Unlike cloud architecture, where maintenance is made seamless, it is not so in fog.
  • 10. FOG COMPUTING USE CASES Even though fog computing is anticipated to grow at a rapid rate, it is still a technology that is most popular within industries that need data close to the network edge. •Hospitality •Retail •Wearables •Smart buildings •Agriculture •Government •Military
  • 11. Fog computing is an exciting development in technology that addresses the need for data processing and storage closer to the data source, such as sensors and smart devices, rather than relying solely on centralized data centers. By placing computation and data storage at the edge of the network, fog computing significantly reduces latency and improves performance for tasks that require real-time responses. This is particularly beneficial for applications in smart cities, healthcare, industrial automation, and the Internet of Things (IoT), where rapid data processing and minimal delay are critical. CONCLUSION
  翻译: