SlideShare a Scribd company logo
Fog
Computing
Plan
• Introduction
• What is Fog Computing?
• Characteristics
• Fog vs Cloud
• Architecture
• Applications
• Research directions
• Products
2/20
Introduction
• Data collected and sent to Cloud
• Cloud Computing -> Big data
processing
• Low-Latency, high velocity,
multiple location distribution ->
Cloud fails
• Privacy concerns
CLOUD
3/20
CLOUD
What is Fog Computing?
• Distributed computing
paradigm
• Extends the services provided
by the cloud to the edge of the
network
4/20
Fog Computing Characteristics
• Reduction of network traffic
• Suitable for IoT tasks and queries
• Low-latency requirement
• Scalability
5/20
Fog vs Cloud
Requirement Cloud Fog
Latency High Low
Delay Jitter High Very Low
Location of server nodes Within internet Edge of local network
Distance between client
and server
Multiple hops Single hop
Security Undefined Can be defined
Attack on data router High probability Vary less probability
Location awareness No Yes
6/20
Fog Computing architecture
IOT applications and
solutions
Software-Defined resource
management
Cloud Services and
Resources
Network
Sensors, Edge devices,
gateways and apps
7/20
Software-defined resource management
• Reduce the cost of using Cloud
• Acceptable level of latency
• Pushing task execution to Fog nodes
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
8/20
Software-defined resource management
• State of available Cloud, Fog and network resources
• Identify incoming task best candidate
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
9/20
Software-defined resource management
• Store historical information (application and resource demands)
• Support decision making process
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
10/20
Software-defined resource management
• Utilizes information of Knowledge base
• Estimate the performance of available resources
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
11/20
Software-defined resource management
• Direct access to data sources
• Provides views from data for other services
• SQL, NOSQL APIs …
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
12/20
Software-defined resource management
• Keeps track of performance and status of applications
• Supplies this information to others
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
13/20
Software-defined resource management
• Utilizes information of Knowledge base
• Builds resource and application profiles
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
14/20
Software-defined resource management
• Acquiring Cloud, Fog and network resources for hosting applications
• Dynamic allocation
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
15/20
Software-defined resource management
• Authentication
• Authorization
• Cryptography
Flow and task
placement
Knowledge
base
Performance
prediction
Raw data
management
Monitoring Profiling
Resource
Provisioning
Security
16/20
Applications
• Connected vehicles
• Smart cities
• Mobile users
• Healthcare applications
• Augmented Reality
17/20
Research directions
• Programming models
• Security and reliability
• Resource management
• Energy minimization
18/20
Products
19/20
Conclusion
• Solution for data processing problem in IOT
• Edge of the network
• Reduce latency
• Higher privacy
• Many challenges: security, energy usage minimization
20/20
Thank You
Ad

More Related Content

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
Rupak Chaulagain
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
Pooja Sharma
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Samit Kumar Kapat
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
pranjali rawke
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Vikas Yadav
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
Divya S
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
MonishaNehkal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ČhauÐhařÿ Faísal Ãlï
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
pradeepas7
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
Pranav Vashistha
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
sairamgoud16
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Karthik Sathyanarayanan
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 

Similar to Fog computing (20)

Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
information of technology ppt of cloud computing
information of technology ppt of cloud computinginformation of technology ppt of cloud computing
information of technology ppt of cloud computing
shaikrabbani034
 
WK10Section 3
WK10Section 3WK10Section 3
WK10Section 3
Pamela R. Gist
 
The Evolving Data Center – Past, Present and Future
The Evolving Data Center – Past, Present and FutureThe Evolving Data Center – Past, Present and Future
The Evolving Data Center – Past, Present and Future
Cisco Canada
 
Building Blocks for Hybrid IT
Building Blocks for Hybrid ITBuilding Blocks for Hybrid IT
Building Blocks for Hybrid IT
RightScale
 
Introduction to Cloud seminar presentation.pptx
Introduction to Cloud seminar presentation.pptxIntroduction to Cloud seminar presentation.pptx
Introduction to Cloud seminar presentation.pptx
NayanTripathi5
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Cloud Migration
Cloud MigrationCloud Migration
Cloud Migration
Jolyne Marie
 
Big data analytics and machine intelligence v5.0
Big data analytics and machine intelligence   v5.0Big data analytics and machine intelligence   v5.0
Big data analytics and machine intelligence v5.0
Amr Kamel Deklel
 
Big data meet_up_08042016
Big data meet_up_08042016Big data meet_up_08042016
Big data meet_up_08042016
Mark Smith
 
DevOps in IoT
DevOps in IoTDevOps in IoT
DevOps in IoT
Dmitry Lavrinenko
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
Chris Evans
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
drth5
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
NileshNagrale1
 
Edge comp
Edge compEdge comp
Edge comp
mahendra665237
 
Cloud Workload Suitability
Cloud Workload SuitabilityCloud Workload Suitability
Cloud Workload Suitability
Vedanta Barooah
 
Stefan Haase Cloud
Stefan Haase CloudStefan Haase Cloud
Stefan Haase Cloud
Tracey Johnson
 
GCP.pptx
GCP.pptxGCP.pptx
GCP.pptx
Harissh16
 
10. Lec X- SDN.pptx
10. Lec X- SDN.pptx10. Lec X- SDN.pptx
10. Lec X- SDN.pptx
DanishMahmood23
 
bruce-sdn.pptx
bruce-sdn.pptxbruce-sdn.pptx
bruce-sdn.pptx
Sameer Ali
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
information of technology ppt of cloud computing
information of technology ppt of cloud computinginformation of technology ppt of cloud computing
information of technology ppt of cloud computing
shaikrabbani034
 
The Evolving Data Center – Past, Present and Future
The Evolving Data Center – Past, Present and FutureThe Evolving Data Center – Past, Present and Future
The Evolving Data Center – Past, Present and Future
Cisco Canada
 
Building Blocks for Hybrid IT
Building Blocks for Hybrid ITBuilding Blocks for Hybrid IT
Building Blocks for Hybrid IT
RightScale
 
Introduction to Cloud seminar presentation.pptx
Introduction to Cloud seminar presentation.pptxIntroduction to Cloud seminar presentation.pptx
Introduction to Cloud seminar presentation.pptx
NayanTripathi5
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Big data analytics and machine intelligence v5.0
Big data analytics and machine intelligence   v5.0Big data analytics and machine intelligence   v5.0
Big data analytics and machine intelligence v5.0
Amr Kamel Deklel
 
Big data meet_up_08042016
Big data meet_up_08042016Big data meet_up_08042016
Big data meet_up_08042016
Mark Smith
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
Chris Evans
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
drth5
 
Cloud Workload Suitability
Cloud Workload SuitabilityCloud Workload Suitability
Cloud Workload Suitability
Vedanta Barooah
 
bruce-sdn.pptx
bruce-sdn.pptxbruce-sdn.pptx
bruce-sdn.pptx
Sameer Ali
 
Ad

More from Hadi Fadlallah (20)

RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
Hadi Fadlallah
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
Hadi Fadlallah
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?
Hadi Fadlallah
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
Hadi Fadlallah
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
Hadi Fadlallah
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
Hadi Fadlallah
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologies
Hadi Fadlallah
 
Inertial sensors
Inertial sensors Inertial sensors
Inertial sensors
Hadi Fadlallah
 
Big Data Integration
Big Data IntegrationBig Data Integration
Big Data Integration
Hadi Fadlallah
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing models
Hadi Fadlallah
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
Hadi Fadlallah
 
Marketing Mobile
Marketing MobileMarketing Mobile
Marketing Mobile
Hadi Fadlallah
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing Protocol
Hadi Fadlallah
 
Bhopal disaster
Bhopal disasterBhopal disaster
Bhopal disaster
Hadi Fadlallah
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless network
Hadi Fadlallah
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
Hadi Fadlallah
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificates
Hadi Fadlallah
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data mining
Hadi Fadlallah
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queries
Hadi Fadlallah
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
Hadi Fadlallah
 
RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
Hadi Fadlallah
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
Hadi Fadlallah
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?
Hadi Fadlallah
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
Hadi Fadlallah
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
Hadi Fadlallah
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
Hadi Fadlallah
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologies
Hadi Fadlallah
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing models
Hadi Fadlallah
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
Hadi Fadlallah
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing Protocol
Hadi Fadlallah
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless network
Hadi Fadlallah
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificates
Hadi Fadlallah
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data mining
Hadi Fadlallah
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queries
Hadi Fadlallah
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
Hadi Fadlallah
 
Ad

Recently uploaded (20)

Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 

Fog computing

  • 2. Plan • Introduction • What is Fog Computing? • Characteristics • Fog vs Cloud • Architecture • Applications • Research directions • Products 2/20
  • 3. Introduction • Data collected and sent to Cloud • Cloud Computing -> Big data processing • Low-Latency, high velocity, multiple location distribution -> Cloud fails • Privacy concerns CLOUD 3/20
  • 4. CLOUD What is Fog Computing? • Distributed computing paradigm • Extends the services provided by the cloud to the edge of the network 4/20
  • 5. Fog Computing Characteristics • Reduction of network traffic • Suitable for IoT tasks and queries • Low-latency requirement • Scalability 5/20
  • 6. Fog vs Cloud Requirement Cloud Fog Latency High Low Delay Jitter High Very Low Location of server nodes Within internet Edge of local network Distance between client and server Multiple hops Single hop Security Undefined Can be defined Attack on data router High probability Vary less probability Location awareness No Yes 6/20
  • 7. Fog Computing architecture IOT applications and solutions Software-Defined resource management Cloud Services and Resources Network Sensors, Edge devices, gateways and apps 7/20
  • 8. Software-defined resource management • Reduce the cost of using Cloud • Acceptable level of latency • Pushing task execution to Fog nodes Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 8/20
  • 9. Software-defined resource management • State of available Cloud, Fog and network resources • Identify incoming task best candidate Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 9/20
  • 10. Software-defined resource management • Store historical information (application and resource demands) • Support decision making process Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 10/20
  • 11. Software-defined resource management • Utilizes information of Knowledge base • Estimate the performance of available resources Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 11/20
  • 12. Software-defined resource management • Direct access to data sources • Provides views from data for other services • SQL, NOSQL APIs … Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 12/20
  • 13. Software-defined resource management • Keeps track of performance and status of applications • Supplies this information to others Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 13/20
  • 14. Software-defined resource management • Utilizes information of Knowledge base • Builds resource and application profiles Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 14/20
  • 15. Software-defined resource management • Acquiring Cloud, Fog and network resources for hosting applications • Dynamic allocation Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 15/20
  • 16. Software-defined resource management • Authentication • Authorization • Cryptography Flow and task placement Knowledge base Performance prediction Raw data management Monitoring Profiling Resource Provisioning Security 16/20
  • 17. Applications • Connected vehicles • Smart cities • Mobile users • Healthcare applications • Augmented Reality 17/20
  • 18. Research directions • Programming models • Security and reliability • Resource management • Energy minimization 18/20
  • 20. Conclusion • Solution for data processing problem in IOT • Edge of the network • Reduce latency • Higher privacy • Many challenges: security, energy usage minimization 20/20