SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Fog Computing
( Foggy Cloud)
Presented by:
Nazia Alam
Iffat Anjum
1
Fog Computing:
Principles,
Architectures, and
Applications
Internet of Things, Chapter 04
Amir Vahid Dastjerdi, Rajkumar Buyya;
Morgan Kaufmann 2016
Fog Computing: Helping the
Internet of Things Realize Its
Potential
Amir Vahid Dastjerdi and Rajkumar Buyya,
University of Melbourne; Computer, IEEE, vol. 49,
Aug. 2016
2
Introduction
IoT environments consist of loosely connected devices that are
connected through heterogeneous networks.
In general, the purpose of building such environments
is collecting and processing data from IoT devices to mine and detect
patterns, or
perform predictive analysis or optimization and
finally make smarter decision in a timely manner.
3
Introduction
The Internet of Everything (IoE) solutions gradually bring every object online.
Data is collected and aggregated from IoT devices and sent to the centralized
cloud to storage and processing.
But processing data in centralized cloud does not scale to requirements of
such environment, where data flows can reach even up to 25000 tuple per
second.
There are applications such as health monitoring and emergency response
that require low latency
delay caused by transferring data to the cloud and then back to the application
can seriously impact the performance. 4
Introduction
Here comes the need of alternative paradigm that
capable of bringing the computation to more computationally capable
devices
geographically closer to the sensors than to the clouds and that have
connectivity to the Internet.
Such devices, which are in the edge of the network and therefore referred to
as edge devices,
can build local views of data flows
can aggregate data to be sent to the cloud for further off-line analysis. 5
Introduction to Fog Computing
Fog computing is a plagiarism,
where cloud computing is extended to the edge of the network to decrease
the latency and network congestion.
which manages a highly distributed and possibly virtualized
environment that provides compute, storage and network services
between end-devices and cloud data centers.
6
Introduction to Fog Computing
Fog computing essentially involves components of an application running
both in the cloud as well as in edge devices between sensors and the
cloud i.e. in smart gateways, routers or dedicated fog devices.
Fog computing is a distributed paradigm that provides cloud-like services to
the network edge.
It leverages cloud and edge resources along with its own infrastructure
7
Distributed
data processing
in a fog-
computing
environment
8
Why Fog Computing?
Reduction of network traffic
Suitable for IoT tasks and queries
Low latency requirement
Scalability
Raw data management
Monitoring
Resource Provisioning
9
Architecture of
Fog Computing
10
Fog-computing Components
Fog systems generally use the sense-process- actuate and stream-processing
programming models.
Sensors stream data to IoT networks, applications running on fog devices
subscribe to and process the information, and the obtained insights are
translated into actions sent to actuators.
Fog systems dynamically discover and use APIs to build complex functionalities.
Components at the resource-management layer use information from the
resource monitoring service to track the state of available cloud, fog, and
network resources and identify the best candidates to process incoming
tasks.
11
Range of
applications
benefitting from Fog
Computing
12
Fog Computing Applications
Healthcare and activity tracking
Smart utility services
Augmented reality, cognitive systems, and gaming
13
Fog Computing Challenges
Realizing fog computing’s full potential presents several challenges
Balancing load distribution between edge and cloud resources,
API and service management and sharing, and
SDN communications.
There are some others like
Enabling real-time analytics
Programming models and architectures
Security, reliability, and fault tolerance 14
Foggy clouds and cloudy fogs: a real need for
coordinated management of fog-to-cloud (F2C)
computing systems
15
Xavi Masip-Bruin, Eva
Marín-
Tordera, Ghazal Tashakor
Universitat Politècnica de
Catalunya
CRAAX-UPC, Spain
Admela Jukan
Technische Universität
Braunschweig
Germany
Guang-Jie Ren
IBM, Almaden Research
Center, USA
gren@us.ibm.com
IEEE Wireless Communications Magazine
December 2015
Introduction
The most recent developments in the information and communications
technologies area have started to make a profound impact,
through massive connectivity of humans and computers,
massive increase of edge devices carried by humans (i.e. smart phones)
These two major commodities,
have facilitated the true “anywhere, anyhow, anytime” users’ connectivity,
have enabled the data collection, the deployment of new value-added
services. 16
Introduction
Although cloud computing an indispensable communication and computing
paradigm for all users and Internet applications, a couple of major limitations
remain unsolved in regard to edge-devices.
First, the larger the distance between the cloud and the edge device,
lower the performance,
efficiency of resource usage,
security/reliability guarantees.
Second, cloud computing and storage service notoriously cannot provide
guarantees to low latency applications. 17
Introduction to Fog Computing
Fog computing is a concept where edge devices and user clients have the
capability to compute, store and exchange data among each other and with
the cloud
In fog computing, data to be processed is usually close to the user,
It will facilitate the deployment of new services that cloud computing cannot
provide particularly those with real time guarantee
A classical example of a fog computing service: emergency medicine
service
real-time low-latency constraints associated with implantable medical devices, 18
Introduction to Fog Computing
Fog computing can incorporate the user’s mobility as an inherent feature:
For example,
vehicular fog-clouds can be built by grouping cars located in a parking lot,
roadside clouds can be built by putting together buildings, traffic lights, etc.
Even humans can “group” by creating neighborhoods clouds, ad-hoc
communities,
customized dynamic clouds that can be set, released and offered on-demand
19
Fog Computing Challenges
Fog computing alone is not solution to all difficulties, a few issues needed to
be resolved:
Volatility due to intermittent presence
Security and reliability
Business model
Reliability
20
Fog-to-Cloud Computing System
The author's addresses the need of a joint framework that,
Capable of managing the emerging Fog-to-Cloud (F2C) computing and
network architecture
User’s edge devices and IoT devices will continue to leverage the capacities
provided by cloud, and gradually include functions innate to fog computing
This joint process will be available to collect, exchange and analyze data.
These services will be provided at either cloud or fog premises, or both, and
that according to the required services needs and demands.
21
The Fog-to-Cloud (F2C) Architecture
F2C is a novel hierarchical architecture consisting of a layered management
structure
It is a dynamic hierarchy, where services can dynamically use and choose
a specific cloud offer (i.e., a specific layer in hierarchy) and
the suitable cloud or fog resources for the service execution (inside each layer).
Provides features for real-time application support, low latency, load reduction
and energy efficiency
22
Cloud
evolution
towards fog-
to-cloud
computing
23
The Fog-to-Cloud (F2C): coordinated management
For the whole ecosystem of Fog-to-Cloud computing to work in a dynamic,
collaborative and coordinated way, there are a number of challanges:
Cloud/fogs identification
An existing cloud capacity must be identified before being used.
Semantic adaptation
Performance and expected capacities are far different depending on the cloud/fog
characteristics.
Coordinated layer orchestration
Overall orchestration is required to generate an individual workflow of actions for each Service
and coordinate the interactions among the different layers involved in the execution of the
service. 24
The Fog-to-Cloud (F2C): coordinated management
Challenges:
Services execution scheduling
Service scheduling is required to decide how a service’s individual functions are split into the
different fog layers, and how each layer processes the services
Seamless-transparent management
The overall performance observed by the client (i.e., the service) must be completely
transparent to the real resources utilized to deploy the service.
QoS guarantees
strategies to achieve QoS (or near QoS) must be set to guarantee quality including resource 25
F2C Performance Analysis
Medical emergency scenario for F2C performance evaluation 26
THANK YOU
27

Weitere ähnliche Inhalte

Was ist angesagt?

Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 

Was ist angesagt? (20)

Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog computing
Fog computingFog computing
Fog computing
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 

Ähnlich wie Fog computing ( foggy cloud)

Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
A220113
A220113A220113
A220113
irjes
 

Ähnlich wie Fog computing ( foggy cloud) (20)

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Seminar report
Seminar reportSeminar report
Seminar report
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Fog security
Fog securityFog security
Fog security
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A220113
A220113A220113
A220113
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentConceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
 

Mehr von Iffat Anjum

Mehr von Iffat Anjum (20)

Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
 
Data link control
Data link controlData link control
Data link control
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Fog computing ( foggy cloud)

  • 1. Fog Computing ( Foggy Cloud) Presented by: Nazia Alam Iffat Anjum 1
  • 2. Fog Computing: Principles, Architectures, and Applications Internet of Things, Chapter 04 Amir Vahid Dastjerdi, Rajkumar Buyya; Morgan Kaufmann 2016 Fog Computing: Helping the Internet of Things Realize Its Potential Amir Vahid Dastjerdi and Rajkumar Buyya, University of Melbourne; Computer, IEEE, vol. 49, Aug. 2016 2
  • 3. Introduction IoT environments consist of loosely connected devices that are connected through heterogeneous networks. In general, the purpose of building such environments is collecting and processing data from IoT devices to mine and detect patterns, or perform predictive analysis or optimization and finally make smarter decision in a timely manner. 3
  • 4. Introduction The Internet of Everything (IoE) solutions gradually bring every object online. Data is collected and aggregated from IoT devices and sent to the centralized cloud to storage and processing. But processing data in centralized cloud does not scale to requirements of such environment, where data flows can reach even up to 25000 tuple per second. There are applications such as health monitoring and emergency response that require low latency delay caused by transferring data to the cloud and then back to the application can seriously impact the performance. 4
  • 5. Introduction Here comes the need of alternative paradigm that capable of bringing the computation to more computationally capable devices geographically closer to the sensors than to the clouds and that have connectivity to the Internet. Such devices, which are in the edge of the network and therefore referred to as edge devices, can build local views of data flows can aggregate data to be sent to the cloud for further off-line analysis. 5
  • 6. Introduction to Fog Computing Fog computing is a plagiarism, where cloud computing is extended to the edge of the network to decrease the latency and network congestion. which manages a highly distributed and possibly virtualized environment that provides compute, storage and network services between end-devices and cloud data centers. 6
  • 7. Introduction to Fog Computing Fog computing essentially involves components of an application running both in the cloud as well as in edge devices between sensors and the cloud i.e. in smart gateways, routers or dedicated fog devices. Fog computing is a distributed paradigm that provides cloud-like services to the network edge. It leverages cloud and edge resources along with its own infrastructure 7
  • 8. Distributed data processing in a fog- computing environment 8
  • 9. Why Fog Computing? Reduction of network traffic Suitable for IoT tasks and queries Low latency requirement Scalability Raw data management Monitoring Resource Provisioning 9
  • 11. Fog-computing Components Fog systems generally use the sense-process- actuate and stream-processing programming models. Sensors stream data to IoT networks, applications running on fog devices subscribe to and process the information, and the obtained insights are translated into actions sent to actuators. Fog systems dynamically discover and use APIs to build complex functionalities. Components at the resource-management layer use information from the resource monitoring service to track the state of available cloud, fog, and network resources and identify the best candidates to process incoming tasks. 11
  • 13. Fog Computing Applications Healthcare and activity tracking Smart utility services Augmented reality, cognitive systems, and gaming 13
  • 14. Fog Computing Challenges Realizing fog computing’s full potential presents several challenges Balancing load distribution between edge and cloud resources, API and service management and sharing, and SDN communications. There are some others like Enabling real-time analytics Programming models and architectures Security, reliability, and fault tolerance 14
  • 15. Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud (F2C) computing systems 15 Xavi Masip-Bruin, Eva Marín- Tordera, Ghazal Tashakor Universitat Politècnica de Catalunya CRAAX-UPC, Spain Admela Jukan Technische Universität Braunschweig Germany Guang-Jie Ren IBM, Almaden Research Center, USA gren@us.ibm.com IEEE Wireless Communications Magazine December 2015
  • 16. Introduction The most recent developments in the information and communications technologies area have started to make a profound impact, through massive connectivity of humans and computers, massive increase of edge devices carried by humans (i.e. smart phones) These two major commodities, have facilitated the true “anywhere, anyhow, anytime” users’ connectivity, have enabled the data collection, the deployment of new value-added services. 16
  • 17. Introduction Although cloud computing an indispensable communication and computing paradigm for all users and Internet applications, a couple of major limitations remain unsolved in regard to edge-devices. First, the larger the distance between the cloud and the edge device, lower the performance, efficiency of resource usage, security/reliability guarantees. Second, cloud computing and storage service notoriously cannot provide guarantees to low latency applications. 17
  • 18. Introduction to Fog Computing Fog computing is a concept where edge devices and user clients have the capability to compute, store and exchange data among each other and with the cloud In fog computing, data to be processed is usually close to the user, It will facilitate the deployment of new services that cloud computing cannot provide particularly those with real time guarantee A classical example of a fog computing service: emergency medicine service real-time low-latency constraints associated with implantable medical devices, 18
  • 19. Introduction to Fog Computing Fog computing can incorporate the user’s mobility as an inherent feature: For example, vehicular fog-clouds can be built by grouping cars located in a parking lot, roadside clouds can be built by putting together buildings, traffic lights, etc. Even humans can “group” by creating neighborhoods clouds, ad-hoc communities, customized dynamic clouds that can be set, released and offered on-demand 19
  • 20. Fog Computing Challenges Fog computing alone is not solution to all difficulties, a few issues needed to be resolved: Volatility due to intermittent presence Security and reliability Business model Reliability 20
  • 21. Fog-to-Cloud Computing System The author's addresses the need of a joint framework that, Capable of managing the emerging Fog-to-Cloud (F2C) computing and network architecture User’s edge devices and IoT devices will continue to leverage the capacities provided by cloud, and gradually include functions innate to fog computing This joint process will be available to collect, exchange and analyze data. These services will be provided at either cloud or fog premises, or both, and that according to the required services needs and demands. 21
  • 22. The Fog-to-Cloud (F2C) Architecture F2C is a novel hierarchical architecture consisting of a layered management structure It is a dynamic hierarchy, where services can dynamically use and choose a specific cloud offer (i.e., a specific layer in hierarchy) and the suitable cloud or fog resources for the service execution (inside each layer). Provides features for real-time application support, low latency, load reduction and energy efficiency 22
  • 24. The Fog-to-Cloud (F2C): coordinated management For the whole ecosystem of Fog-to-Cloud computing to work in a dynamic, collaborative and coordinated way, there are a number of challanges: Cloud/fogs identification An existing cloud capacity must be identified before being used. Semantic adaptation Performance and expected capacities are far different depending on the cloud/fog characteristics. Coordinated layer orchestration Overall orchestration is required to generate an individual workflow of actions for each Service and coordinate the interactions among the different layers involved in the execution of the service. 24
  • 25. The Fog-to-Cloud (F2C): coordinated management Challenges: Services execution scheduling Service scheduling is required to decide how a service’s individual functions are split into the different fog layers, and how each layer processes the services Seamless-transparent management The overall performance observed by the client (i.e., the service) must be completely transparent to the real resources utilized to deploy the service. QoS guarantees strategies to achieve QoS (or near QoS) must be set to guarantee quality including resource 25
  • 26. F2C Performance Analysis Medical emergency scenario for F2C performance evaluation 26