SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Fog Computing
What, How and Why
by
SHAKEEB AHMAD
SHAIKH ABUZAR
What is it?
• It defines a mix of a traditional centralized data storage system and
Cloud.
• Computing is performed at local networks, although servers
themselves are decentralized.
• The term fog computing was coined by Cisco
• The fog extends the cloud to be closer to the things that produce and
act on IoT data.
Extend the Cloud to Where the Things Are
In technical language
• These devices, called fog nodes, can be deployed anywhere with a
network connection: on a factory floor, on top of a power pole,
alongside a railway track, in a vehicle, or on an oil rig.
• Any device with computing, storage, and network connectivity can be
a fog node.
• Analyzing IoT data close to where it is collected minimizes latency.
• It offloads gigabytes of network traffic from the core network.
• It keeps sensitive data inside the network.
Fog computing vs cloud computing
• The data, therefore, can be accessed offline because some portions of
it are stored locally as well.
• This is the key distinction between fog computing vs cloud computing,
where all the intelligence and computing are performed on remote
servers.
• Rephrased: The main difference between cloud computing and fog
computing is that the former provides centralized access to resources
whereas the latter provides a decentralized local access.
Benefits?
• Low latency
• The fog network can process large volumes of data with little-to-no delay.
• Because a lot of data is stored locally, the computing is performed faster.
• Better data control
• In cloud computing, third-party servers are fully disconnected from local networks, leaving
little to no control over data.
• In fog computing, users can manage a lot of information locally and rely on their security
measures.
• A flexible storage system
• Fog computing doesn’t require constant online access
• The data can be stored locally or pulled up from local drives — such storage combines online
and offline access.
• Connecting centralized and decentralized storage
• Fog computing builds a bridge between local drives and third-party cloud services, allowing a
smooth transition to fully decentralized data storage.
Why do we need it?
• Smart sensors and IoT devices generate immense amount of data, which
would be costly and time-consuming to send to the cloud for processing
and analysis.
• Fog computing reduces
• bandwidth needed
• back-and-forth communication between sensors and the cloud
• which can negatively affect IoT performance
• Although latency may be annoying when sensors are part of a gaming
application, delays in data transmission in many real-world IoT scenarios
can be life-threatening
• Security shortcomings: Existing data protection mechanism in cloud
computing such as encryption failed in securing the data from the attackers
How it works
• Fog computing works by deploying fog nodes throughout your
network.
• Devices from controllers, switches, routers, and video cameras can
act as fog nodes.
• These fog nodes can then be deployed in target areas such as your
office floor or within a vehicle.
• When an IoT device generates data this can then be analyzed via one
of these nodes without having to be sent all the way back to the
cloud.
Working (…continued)
• Transporting data through fog computing has the following steps:
• Signals from IoT devices are wired to an automation controller which then
executes a control system program to automate the devices.
• The control system program sends data through to an OPC server or protocol
gateway.
• The data is then converted into a protocol that can be more easily understood
by internet-based services (Typically this is a protocol like HTTP or MQTT).
• Finally, the data is sent to a fog node or IoT gateway which collects the data
for further analysis. This will filter the data and in some cases save it to hand
over to the cloud later.
Role of cloud in fog computing
• The primary advantage of cloud-based systems is they allow data to be
collected from multiple sites and devices, which is accessible anywhere in
the world.
• Cloud computing is the standard of IoT data storage right now. It’s the form
of computing where data is stored on multiple servers and can be accessed
online from any device. Instead of saving information to the local hard
drive on a single computer, users store it on third-party online servers.
• To access data, a user needs to enter an account associated with the cloud
service. The data undergoes end-to-end encryption, so even service
providers have no access to the user’s contents. For the Internet of Things,
this means securely storing and managing a lot of data and having
immediate access to it from multiple devices, anytime, anywhere.
Edge vs Fog computing
• The key difference between the two lies in where the location of
intelligence and compute power is placed.
• A fog environment places intelligence at the local area network (LAN).
• Edge computing places intelligence and processing power in devices such as
embedded automation controllers.
• Edge computing processes data away from centralized storage,
keeping information on the local parts of the network — edge
devices. When the data is sent to the edge device, it can be processed
directly on it, without being sent to the centralized cloud.
Few insights
• How do fog and edge computing work?
• Fog computing is useful when the Internet connection isn’t always stable. For instance, on
connected trains the fog system can pull up locally stored data on areas where the Internet
connection can’t be maintained.
• How is data processed by fog computing?
• Urgent requests are sent directly to the fog and processed locally in the network;
• Less sensitive data is transferred to the cloud’s main data centers where it’s stored and analyzed;
• Under normal conditions, the majority of data goes to the cloud, local storages are used in
scenarios where saving bandwidth is a priority.
• Fog computing allows to implement data processing at the local networks, especially if it has to
be processed in real time. This is what makes this storage form incredibly stable under stressful
conditions, especially when comparing cloud vs fog computing.
• Edge computing is the least vulnerable form of decentralized storage. On the cloud, data is
distributed to dozens of servers, whereas edge computing uses hundreds, possibly thousands of
local nodes. Each device can act as a server in the edge network. To break into, hackers would
need access to thousands of destributed devices, which is practically impossible.
Use Cases
• Oil and Gas
• Energy and Utilities
• Hospitality
• Retail
• Wearables
• Smart buildings
• Agriculture
• Government
• Military
Limitations
• Physical location – Perhaps the most significant limitation of fog computing is
that it is much more geographically restrictive than a cloud service. A cloud
service can be accessed from anywhere whereas fog computing is used to
interact with devices on a local level. It doesn’t have any centralized access.
• Security – Another key concern is that of security. Fog computing relies on
trusting those close to the edge of the network and the fog nodes to maintain
them and protect them against malicious entities. The lack of visibility of these
systems due to their physical location can leave enterprises open to external
threats.
• Complexity – If you’re using a network with traditional infrastructure, cloud
services, and fog computing, things can get very complex very quickly. All of this
architecture needs to be maintained, and adding a patchwork of these complex
technologies together makes this a very difficult task
Conclusion
• Fog computing makes it easier for the engineers to focus on data and
handling the data instead of designing and maintaining the
architecture.

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCentric
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingSabelo Dlamini
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Jiang Zhu
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingGAURAV SINHA
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a serviceHadi Fadlallah
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid ComputingLeen Blom
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingJulien SIMON
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...Pawan Arya
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 

Was ist angesagt? (20)

FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog Computing
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
 
Network Presentation
Network PresentationNetwork Presentation
Network Presentation
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
 
Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge Computing
 
Amdlrmo needs
Amdlrmo needsAmdlrmo needs
Amdlrmo needs
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 

Ähnlich wie Fog Computing: What, How and Why [Shakeeb A.]

Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptxdrth5
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityfPrathmeshnawale2
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptxandre241421
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfAnujashejwal
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Infosys
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 

Ähnlich wie Fog Computing: What, How and Why [Shakeeb A.] (20)

Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge comp
Edge compEdge comp
Edge comp
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptx
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
2.pdf
2.pdf2.pdf
2.pdf
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
13778757.ppt
13778757.ppt13778757.ppt
13778757.ppt
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Fog Computing: What, How and Why [Shakeeb A.]

  • 1. Fog Computing What, How and Why by SHAKEEB AHMAD SHAIKH ABUZAR
  • 2. What is it? • It defines a mix of a traditional centralized data storage system and Cloud. • Computing is performed at local networks, although servers themselves are decentralized. • The term fog computing was coined by Cisco • The fog extends the cloud to be closer to the things that produce and act on IoT data.
  • 3. Extend the Cloud to Where the Things Are
  • 4. In technical language • These devices, called fog nodes, can be deployed anywhere with a network connection: on a factory floor, on top of a power pole, alongside a railway track, in a vehicle, or on an oil rig. • Any device with computing, storage, and network connectivity can be a fog node. • Analyzing IoT data close to where it is collected minimizes latency. • It offloads gigabytes of network traffic from the core network. • It keeps sensitive data inside the network.
  • 5. Fog computing vs cloud computing • The data, therefore, can be accessed offline because some portions of it are stored locally as well. • This is the key distinction between fog computing vs cloud computing, where all the intelligence and computing are performed on remote servers. • Rephrased: The main difference between cloud computing and fog computing is that the former provides centralized access to resources whereas the latter provides a decentralized local access.
  • 6. Benefits? • Low latency • The fog network can process large volumes of data with little-to-no delay. • Because a lot of data is stored locally, the computing is performed faster. • Better data control • In cloud computing, third-party servers are fully disconnected from local networks, leaving little to no control over data. • In fog computing, users can manage a lot of information locally and rely on their security measures. • A flexible storage system • Fog computing doesn’t require constant online access • The data can be stored locally or pulled up from local drives — such storage combines online and offline access. • Connecting centralized and decentralized storage • Fog computing builds a bridge between local drives and third-party cloud services, allowing a smooth transition to fully decentralized data storage.
  • 7. Why do we need it? • Smart sensors and IoT devices generate immense amount of data, which would be costly and time-consuming to send to the cloud for processing and analysis. • Fog computing reduces • bandwidth needed • back-and-forth communication between sensors and the cloud • which can negatively affect IoT performance • Although latency may be annoying when sensors are part of a gaming application, delays in data transmission in many real-world IoT scenarios can be life-threatening • Security shortcomings: Existing data protection mechanism in cloud computing such as encryption failed in securing the data from the attackers
  • 8. How it works • Fog computing works by deploying fog nodes throughout your network. • Devices from controllers, switches, routers, and video cameras can act as fog nodes. • These fog nodes can then be deployed in target areas such as your office floor or within a vehicle. • When an IoT device generates data this can then be analyzed via one of these nodes without having to be sent all the way back to the cloud.
  • 9. Working (…continued) • Transporting data through fog computing has the following steps: • Signals from IoT devices are wired to an automation controller which then executes a control system program to automate the devices. • The control system program sends data through to an OPC server or protocol gateway. • The data is then converted into a protocol that can be more easily understood by internet-based services (Typically this is a protocol like HTTP or MQTT). • Finally, the data is sent to a fog node or IoT gateway which collects the data for further analysis. This will filter the data and in some cases save it to hand over to the cloud later.
  • 10.
  • 11. Role of cloud in fog computing • The primary advantage of cloud-based systems is they allow data to be collected from multiple sites and devices, which is accessible anywhere in the world. • Cloud computing is the standard of IoT data storage right now. It’s the form of computing where data is stored on multiple servers and can be accessed online from any device. Instead of saving information to the local hard drive on a single computer, users store it on third-party online servers. • To access data, a user needs to enter an account associated with the cloud service. The data undergoes end-to-end encryption, so even service providers have no access to the user’s contents. For the Internet of Things, this means securely storing and managing a lot of data and having immediate access to it from multiple devices, anytime, anywhere.
  • 12.
  • 13. Edge vs Fog computing • The key difference between the two lies in where the location of intelligence and compute power is placed. • A fog environment places intelligence at the local area network (LAN). • Edge computing places intelligence and processing power in devices such as embedded automation controllers. • Edge computing processes data away from centralized storage, keeping information on the local parts of the network — edge devices. When the data is sent to the edge device, it can be processed directly on it, without being sent to the centralized cloud.
  • 14. Few insights • How do fog and edge computing work? • Fog computing is useful when the Internet connection isn’t always stable. For instance, on connected trains the fog system can pull up locally stored data on areas where the Internet connection can’t be maintained. • How is data processed by fog computing? • Urgent requests are sent directly to the fog and processed locally in the network; • Less sensitive data is transferred to the cloud’s main data centers where it’s stored and analyzed; • Under normal conditions, the majority of data goes to the cloud, local storages are used in scenarios where saving bandwidth is a priority. • Fog computing allows to implement data processing at the local networks, especially if it has to be processed in real time. This is what makes this storage form incredibly stable under stressful conditions, especially when comparing cloud vs fog computing. • Edge computing is the least vulnerable form of decentralized storage. On the cloud, data is distributed to dozens of servers, whereas edge computing uses hundreds, possibly thousands of local nodes. Each device can act as a server in the edge network. To break into, hackers would need access to thousands of destributed devices, which is practically impossible.
  • 15. Use Cases • Oil and Gas • Energy and Utilities • Hospitality • Retail • Wearables • Smart buildings • Agriculture • Government • Military
  • 16. Limitations • Physical location – Perhaps the most significant limitation of fog computing is that it is much more geographically restrictive than a cloud service. A cloud service can be accessed from anywhere whereas fog computing is used to interact with devices on a local level. It doesn’t have any centralized access. • Security – Another key concern is that of security. Fog computing relies on trusting those close to the edge of the network and the fog nodes to maintain them and protect them against malicious entities. The lack of visibility of these systems due to their physical location can leave enterprises open to external threats. • Complexity – If you’re using a network with traditional infrastructure, cloud services, and fog computing, things can get very complex very quickly. All of this architecture needs to be maintained, and adding a patchwork of these complex technologies together makes this a very difficult task
  • 17. Conclusion • Fog computing makes it easier for the engineers to focus on data and handling the data instead of designing and maintaining the architecture.