Professional Documents
Culture Documents
1
1. Prior to FOG
2. FOG V/S Cloud
3. Introduction to FOG Computing
4. FOG with IOT
5. FOG Framework
6. Pillars of FOG architecture
7. FOG Networking
8. Decoy Systems for security
9. Applications of FOG
10. Conclusion
2
• Cloud computing is a type of Internet-based computing
that provides shared computer processing resources and
data to computers and other devices on demand
3
4
• Fog computing is a model in which data, processing and
applications are concentrated in devices at the network
edge rather than existing almost entirely in the cloud.
• Fog computing is a paradigm which extends cloud
computing paradigm to the edge of the network.
• Fog computing is not a replacement of cloud it just
extends the cloud computing by providing security in the
cloud environment.
• Similar to Cloud, Fog provides data, compute, storage,
and application services to end-users.
5
• Fog sits in between the devices and the cloud
• Fog serves as an embedded software platform designed to
be installed on network switches, devices, sensors and
machines
• It allows machines to communicate directly with each
other without going through the cloud
• By doing so, Fog enables real time decisions to be made
without transmitting vast amounts of data through the
cloud
6
7
8
OpenFog architecture should:
• Include lower latency storage at or near the end-user and business
deployment.
• Perform the required computation near the end-user and data to
avoid latency, network and other migration costs (including
bandwidth).
• Use low latency communication at or near the end-user rather than
requiring all communications to be routed and synchronized through
the backbone network.
• Implement elements of management, including network
measurement, control and configuration, at or near the endpoint
rather than being controlled primarily by gateways such as those in
the LTE Core.
• Allow telemetry and locally computed analytics results to be copied
to the backend cloud in a secured manner for further analytics and9
orchestration.
Fog control plane such as the inference, control, configuration
and management of networks:
10
OTT network provisioning and content management (in
commercial deployment):
11
Client-based HetNets control (in 3GPP standards):
12
Real-time stream mining:
13
Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting
unauthorized access to information and to poison the thief’s ex-
filtrated information.
Serving decoys will confuse an attacker into believing they have ex-
filtrated useful information, when they have not. This technology
may be integrated with user behavior profiling technology
Decoy Systems can be implemented by given two additional
security features:
1. Validating whether data access is authorized when abnormal
information access is detected
2. Confusing the attacker with bogus information that is by providing
decoy documents.
14
Smart Traffic Lights and Connected Vehicles:
Wireless access points like Wi-Fi, 3G, road-side units and smart traffic
lights are deployed along the roads. Vehicles-to Vehicle, vehicle to
access points, and access points to access points interactions enrich the
application of this scenario.
Wireless Sensor and Actuator Networks:
In this scenario, actuators serving as Fog devices can control the
measurement process itself, the stability and the oscillatory behaviours
by creating a closed-loop system. For example, in the scenario of self-
maintaining trains, sensor monitoring on a train’s ball-bearing can
detect heat levels, allowing applications to send an automatic alert to
the train operator to stop the train at next station for emergency
maintenance and avoid potential derailment
15
• Fog computing gives the cloud a companion to handle the two
exabytes of data generated daily from the Internet of Things.
Processing data closer to where it is produced and needed
solves the challenges of exploding data volume, variety, and
velocity.
16
17