SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
F O G C O M P U T I N G
T H E F U T U R E O F I O T T E C H N O L O G Y
By: Priti Vishwakarma -
TA B L E O F C O N T E N T S :
• What is Fog Computing?
• Architecture of Fog Computing
• Characteristics of Fog Computing
• Difference between Edge and Fog Computing
• Fog Deployment Models
• Applications of Fog Computing
• Risks and Challenges
• Conclusion
W H AT I S F O G C O M P U T I N G ?
Clou
d
On
Premises
Data Storage
issues
Data security
High maintenance
cost
Scalability
issues
Data Recovery
Centralized remote cloud
servers
High Data
security
No maintenance cost to
pay
Cost efficient - Pay on
demand
Strong Data Recovery
mechanism
Latency
issue
Edge Computing
Fog Nodes Fog Nodes
Fog Computing
Fog Nodes
F O G C O M P U T I N G A R C H I T E C T U R E
Cloud Layer
(WAN)
Fog Layer
(LAN)
Edge Layer
Sensors &
controllers
(Data Origination)
IoT Devices
Applicatio
n
Applicatio
n
Applicatio
n
Applicatio
n
Applicatio
n
Applicatio
n
C H A R A C T E R I S T I C S O F F O G
C O M P U T I N G
Geographical
distribution
Real time interaction
Save storage space
Low Latency
Heterogeneity support
Mobility Support
Decentralization
Location Awareness
D I F F E R E N C E B E T W E E N E D G E & F O G
Location of data
collection and
processing
Storage
Handling multiple IoT
Applications
Resource Contention
Focus
Fog Computing
Edge Computing
Network edge Near Edge
Edge devices
Network edge devices
and core networking
devices
Unsupported Supported
Serious resource
contention
Slight resource
contention
IoT Device level Infrastructure level
F O G D E P L O Y M E N T M O D E L S
Private organization or 3rd party
Company, Academic institute or Government
organization
One or more Organizations in the Community
Combines the use of public/private/community fog with
public/private cloud. scalable, elastic & available on-
demand.
A P P L I C AT I O N S O F F O G C O M P U T I N G
Live Map
Live Video
Broadcasting
Visual security
and surveillance
for smart cities
Traffic
Congestion
Management
Smart Buildings
Patient
Monitoring
Autonomous
Driving
Smart Street
Lamp
Vehicular
Pollution Control
R I S K S A N D C H A L L E N G E S
Authentication
issue
Cloud service provider
Internet service provider
End users
Fog service providers
Trust issue
Rogue Fog node
Manipulate signals
Launch attacks
Privacy issue Wireless technology
Too many networks involved
Interconnected fog nodes
Risk to sensitive user information
Security issue IP Address
Many devices connected at different
gateways
Risk of hacking a particular fog node
Fog server Selection of fog server
To deliver maximum service
Reduce maintenance cost
C O N C L U S I O N :
The characteristic of fog computing such as mobility, place close to the end user, location awareness,
heterogeneity and their real-time applications, makes fog computing paradigm a more suitable platform for the
internet of things.
However, various security and privacy issues may encounter and hence the design, architecture and
implementation of this technology should be carefully encrypted.
5G is one of the most talk about implementation of this technology however, this technology is still advancing
day by day to overcome risks and challenges.
THANKS
…!!
Questions
??

More Related Content

PPTX
FOG COMPUTING
PPTX
Internet of Things(IoT) - Introduction and Research Areas for Thesis
PPTX
Azure Cloud PPT
PPTX
IoT Applications and Networks
PDF
Cloud, Fog & Edge Computing
PPTX
Cloud testing
PDF
MindSphere: The cloud-based, open IoT operating system. Damiano Manocchia
PDF
Cloud gaming
FOG COMPUTING
Internet of Things(IoT) - Introduction and Research Areas for Thesis
Azure Cloud PPT
IoT Applications and Networks
Cloud, Fog & Edge Computing
Cloud testing
MindSphere: The cloud-based, open IoT operating system. Damiano Manocchia
Cloud gaming

What's hot (20)

PPTX
5G Wireless Technology
PPTX
Internet of Things (IoT)
PDF
Security in Cyber-Physical Systems
PPTX
A survey in privacy and security in Internet of Things IOT
PPTX
Internet of things
PPTX
Akraino and Edge Computing
PPTX
Internet of things(IOT)
PPTX
CLOUD GAMING.pptx
PDF
The essential role of AI in the 5G future
PPTX
Getting Started with Voice UI
PDF
Cloud Testing : An Overview
PPT
Cloud Application Development Lifecycle
PPTX
iot seminar topic
PPSX
iDEN Technology
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
PPTX
Augmented reality
PDF
Internet of Things: A Hands-On Approach
PPTX
Cloud security ppt
5G Wireless Technology
Internet of Things (IoT)
Security in Cyber-Physical Systems
A survey in privacy and security in Internet of Things IOT
Internet of things
Akraino and Edge Computing
Internet of things(IOT)
CLOUD GAMING.pptx
The essential role of AI in the 5G future
Getting Started with Voice UI
Cloud Testing : An Overview
Cloud Application Development Lifecycle
iot seminar topic
iDEN Technology
20 Latest Computer Science Seminar Topics on Emerging Technologies
Augmented reality
Internet of Things: A Hands-On Approach
Cloud security ppt
Ad

Similar to Fog computing (20)

PPTX
semppt.pptx
PPTX
semppt.pptx
PPTX
semppt.pptx
PPTX
Fog Computing
PDF
Brief Introduction to Fog computing.pdf
PPTX
Fog computing : The new age Technology
PPTX
Fog comuting
PDF
Innovations in Edge Computing and MEC
PPTX
Fog computing
PPTX
FOG COMPUTING-2.pptx fog computing ppt on internship
PPTX
Fog computing paper presentation
DOCX
Seminar report
PDF
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
PPT
Fog computing
PPTX
Next Generation Networks for Contactless and Mobile Ticketing
PDF
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
PPTX
Fog computing
PPTX
Fog Computing
PPTX
presentation Comstor IoT_RTL
PPSX
Fog ppt
semppt.pptx
semppt.pptx
semppt.pptx
Fog Computing
Brief Introduction to Fog computing.pdf
Fog computing : The new age Technology
Fog comuting
Innovations in Edge Computing and MEC
Fog computing
FOG COMPUTING-2.pptx fog computing ppt on internship
Fog computing paper presentation
Seminar report
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Fog computing
Next Generation Networks for Contactless and Mobile Ticketing
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Fog computing
Fog Computing
presentation Comstor IoT_RTL
Fog ppt
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Approach and Philosophy of On baking technology
PPTX
Tartificialntelligence_presentation.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
1. Introduction to Computer Programming.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative analysis of optical character recognition models for extracting...
Network Security Unit 5.pdf for BCA BBA.
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Spectroscopy.pptx food analysis technology
Approach and Philosophy of On baking technology
Tartificialntelligence_presentation.pptx
cloud_computing_Infrastucture_as_cloud_p
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Heart disease approach using modified random forest and particle swarm optimi...
1. Introduction to Computer Programming.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Getting Started with Data Integration: FME Form 101
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative analysis of optical character recognition models for extracting...

Fog computing

  • 1. F O G C O M P U T I N G T H E F U T U R E O F I O T T E C H N O L O G Y By: Priti Vishwakarma -
  • 2. TA B L E O F C O N T E N T S : • What is Fog Computing? • Architecture of Fog Computing • Characteristics of Fog Computing • Difference between Edge and Fog Computing • Fog Deployment Models • Applications of Fog Computing • Risks and Challenges • Conclusion
  • 3. W H AT I S F O G C O M P U T I N G ? Clou d On Premises Data Storage issues Data security High maintenance cost Scalability issues Data Recovery Centralized remote cloud servers High Data security No maintenance cost to pay Cost efficient - Pay on demand Strong Data Recovery mechanism Latency issue Edge Computing Fog Nodes Fog Nodes Fog Computing Fog Nodes
  • 4. F O G C O M P U T I N G A R C H I T E C T U R E Cloud Layer (WAN) Fog Layer (LAN) Edge Layer Sensors & controllers (Data Origination) IoT Devices Applicatio n Applicatio n Applicatio n Applicatio n Applicatio n Applicatio n
  • 5. C H A R A C T E R I S T I C S O F F O G C O M P U T I N G Geographical distribution Real time interaction Save storage space Low Latency Heterogeneity support Mobility Support Decentralization Location Awareness
  • 6. D I F F E R E N C E B E T W E E N E D G E & F O G Location of data collection and processing Storage Handling multiple IoT Applications Resource Contention Focus Fog Computing Edge Computing Network edge Near Edge Edge devices Network edge devices and core networking devices Unsupported Supported Serious resource contention Slight resource contention IoT Device level Infrastructure level
  • 7. F O G D E P L O Y M E N T M O D E L S Private organization or 3rd party Company, Academic institute or Government organization One or more Organizations in the Community Combines the use of public/private/community fog with public/private cloud. scalable, elastic & available on- demand.
  • 8. A P P L I C AT I O N S O F F O G C O M P U T I N G Live Map Live Video Broadcasting Visual security and surveillance for smart cities Traffic Congestion Management Smart Buildings Patient Monitoring Autonomous Driving Smart Street Lamp Vehicular Pollution Control
  • 9. R I S K S A N D C H A L L E N G E S Authentication issue Cloud service provider Internet service provider End users Fog service providers Trust issue Rogue Fog node Manipulate signals Launch attacks Privacy issue Wireless technology Too many networks involved Interconnected fog nodes Risk to sensitive user information Security issue IP Address Many devices connected at different gateways Risk of hacking a particular fog node Fog server Selection of fog server To deliver maximum service Reduce maintenance cost
  • 10. C O N C L U S I O N : The characteristic of fog computing such as mobility, place close to the end user, location awareness, heterogeneity and their real-time applications, makes fog computing paradigm a more suitable platform for the internet of things. However, various security and privacy issues may encounter and hence the design, architecture and implementation of this technology should be carefully encrypted. 5G is one of the most talk about implementation of this technology however, this technology is still advancing day by day to overcome risks and challenges.