0% found this document useful (0 votes)
38 views

STC Sample Report

The document is a seminar report submitted by Prathamesh Jayant Lipare to Savitribai Phule Pune University to fulfill the requirements for a Bachelor of Engineering degree in Computer Engineering. The report discusses a task offloading approach for fog computing and cloud computing. It includes an introduction outlining the need, motivation, and background for the topic. It also covers sections on literature review, problem definition and scope, system architecture, result analysis, advantages and disadvantages, applications, and a conclusion with references.

Uploaded by

Devika Wagh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

STC Sample Report

The document is a seminar report submitted by Prathamesh Jayant Lipare to Savitribai Phule Pune University to fulfill the requirements for a Bachelor of Engineering degree in Computer Engineering. The report discusses a task offloading approach for fog computing and cloud computing. It includes an introduction outlining the need, motivation, and background for the topic. It also covers sections on literature review, problem definition and scope, system architecture, result analysis, advantages and disadvantages, applications, and a conclusion with references.

Uploaded by

Devika Wagh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

A SEMINAR REPORT

ON

“A task offloading approach for fog


computing and cloud computing”
SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSIT,PUNE
IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE POST GRADUATION

OF

BACHELOR OF ENGINEERING
(COMPUTER ENGINEERING)

BY

Prathamesh Jayant Lipare Roll No. 22

DEPARTMENT OF COMPUTER ENGINEERING

Marathwada Mitramandal’s Institute of Technology (MMIT)


Lohgaon Pune-411 047

2020-21

1
CERTIFICATE

“A task offloading approach for fog


computing and
cloud computing ”

Submitted by

Prathamesh Jayant Lipare Roll No. 22

Is a bonafide work carried out by her under the supervision of Prof. S. A.


AGRAWAL and it is approved for the partial fulfillment of the requirement
of Savitribai Phule Pune University, Pune for the award of the degree of
Bachelor of Engineering (Computer Engineering)

Prof. Sanjay A. Agrawal Dr. S .G. Rathod


Guide HOD
Department of Computer Engineering Department of Computer Engineering

Dr.R.V.Bhortake
Principal

Place : Pune
Date : 12/06/2021

I
ACKNOWLEDGEMENT

With great pleasure,I express my deep sense of gratitude to my guide


respected Prof.”S. A. AGRAWAL” for his constant interest, valuable
encouragement and timely guidance during completion of the seminar-II
report.

I am thankful to our H.O.D. S.G.Rathod and all other professors and non-
teaching staff of computer engineering department for their timely cooperation
and helpful guidance during the development seminar-II report.

I would like express deep regards towards our TE coordinators Prof.T.S.Bhoye


and Prof.M.S.Jagtap for their encouragement and timely guidance during
completion of seminar-II work.

I would like to express deepest regards towards our principal Dr.R.V.Bhortake.


Lastly, I value motivate and constructive ideas of my friends and everyone
associated with this seminar-II report. I especially give thanks to my parents
give memorial support.

II
Contents

1 INTRODUCTION VII
1.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . VII
1.2 NEED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VII
1.3 MOTIVATION . . . . . . . . . . . . . . . . . . . . . . . . . . VII
1.4 BACKGROUND . . . . . . . . . . . . . . . . . . . . . . . . . VIII

2 LITERATURE SURVEY IX

3 PROBLEM DEFINITION AND SCOPE XI


3.1 PROBLEM DEFINITION . . . . . . . . . . . . . . . . . . . . XI
3.2 SCOPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XI
3.3 OBJECTIVE . . . . . . . . . . . . . . . . . . . . . . . . . . . XI

4 ARCHITECTURE XII
4.1 SYSTEM ARCHITECTURE . . . . . . . . . . . . . . . . . . XII
4.2 TERMINOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . XII
4.2.1 How fog computing works . . . . . . . . . . . . . . . . XII
4.2.2 Bandwidth conservation . . . . . . . . . . . . . . . . . XII
4.2.3 Improved response time. . . . . . . . . . . . . . . . . . XIV
4.2.4 Network-agnostic. . . . . . . . . . . . . . . . . . . . . . XIV
4.2.5 Physical location. . . . . . . . . . . . . . . . . . . . . . XIV
4.2.6 Potential security issues. . . . . . . . . . . . . . . . . . XIV
4.2.7 Startup costs . . . . . . . . . . . . . . . . . . . . . . . XIV
4.2.8 Ambiguous concept . . . . . . . . . . . . . . . . . . . . XIV

5 RESULT ANALYSIS XV
5.1 DATASET USED . . . . . . . . . . . . . . . . . . . . . . . . . XV
5.2 RESULT ANALYSIS . . . . . . . . . . . . . . . . . . . . . . . XV

6 ADVANTAGES DISADVANTAGES XVII


6.1 ADVANTAGES . . . . . . . . . . . . . . . . . . . . . . . . . . XVII

III
6.2 DISADVANTAGES . . . . . . . . . . . . . . . . . . . . . . . . XVII
6.3 APPLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . XVII
6.3.1 SURGE PRICE . . . . . . . . . . . . . . . . . . . . . . XVIII
6.3.2 MATCHING ALGORITHM . . . . . . . . . . . . . . . XVIII
6.3.3 FARE ESTIMATES . . . . . . . . . . . . . . . . . . . XVIII

7 CONCLUSION XIX
7.1 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . XIX

8 REFERENCES XX

IV
List of Figures

4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . XIII

0
[]
ABSTRACT

Cloud computing is used to deliver different services through internet. The


usual resources included in cloud computing are tools applications such as
data storage, networking, databases software. It simply makes it possible
by saving files in remote database rather than keeping them on a propri
etary Hard drive or a local storage. According to a research more than 90
billion devices will be connected to the internet by 2025, as we know IOT
is the future we have to condense fog with cloud computing so that there
is no overflooding of cloud data centers. Fog Computing takes a leap ahead
using decentralization flexibility which differs from cloud computing. The
feature of flexibility makes users to place resources to place resources in log
ical locations and enhance performance. Bandwidth segmented traffic is the
paradigm provided by Fog computing. Fog computing works as a supplement
for cloud computing, where the internet of things applications perform faster
with no redundancy. Fog actually does the work on its own but as the work
load increases the utility of this computing becomes weak, therefore when fog
is unable to do so, the heavy computations are offloaded from fog to cloud.
But the offloading becomes one of the major decisions[7]. This Seminar will
unfold the crucial points that can mark out the decision theory of offloading
files/resources from Fog to Cloud vice versa .

Keywords: Cloud computing, fog computing.

VI
Chapter 1

INTRODUCTION

1.1 INTRODUCTION
Data Science is an interdisciplinary field about processes and systems to
extract knowledge or insights from large volumes of data in various forms
either structured or unstructured, which is a continuation of some of the
data analysis fields such as data mining and predictive analytics, as well as
knowledge discovery and data mining (KDD). Data Science is about turning
data into insights[4].Business Intelligence is concerned with the process of
transforming data into insights.

1.2 NEED
Cloud computing allows people access to the same kinds of applications
through the internet. ... This means the device accessing the cloud doesn’t
need to work as hard. By hosting software, platforms, and databases re-
motely, the cloud servers free up the memory and computing power of indi-
vidual computers.

1.3 MOTIVATION
CISCO recently delivered the vision of fog computing to enable applica-
tions on billions of connected devices,already connected in the Internet of
Things(IoT),to run directly at the network edge[1].Customers can develop,
manage and run software application on Cisco IOx framework of networked
devices, including hardened routers, switches and IP video cameras. Cisco
IOx framework of networked devices, including hardened routers. Cloud

VII
computing has become the buzz word during the recent years. But it largely
depends on servers which are available in a remote location, resulting in
slow response time and scalability plays a crucial role in machine to ma-
chine communication and services[6]. The edge computing platform solves
the problems by the simple idea of locating small servers called edges servers
in the vicinity of the users and devices and passing to the servers some of
the load of center servers or userÄôs devices.

1.4 BACKGROUND
Fog computing has its origins as an extension of cloud computing, which is
the paradigm to have the data, storage and applications on a distant server,
and not hosted locally.

VIII
Chapter 2

LITERATURE SURVEY

1. Pearson, Siani, et al. (2010) [4]


Wrote a paper.In this paper authors described that Äúcloud computing
is an emerging paradigm for large scale infrastructures. It has the
advantage of reducing cost by sharing computing and storage resources,
combined with an on-demand provisioning mechanism relying on a pay
per-use business model. These new features have a direct impact on
the budgeting of IT budgeting but also affect traditional security, trust
and privacy mechanisms. Many of these mechanisms are no longer
adequate, but need to be rethought to fit this new paradigm. In this
paper they assessed how security, trust and privacy issues occur in the
context of cloud computing and discuss ways in which they may be
addressedÄù.

2. Dlamini, M. T. et al. (2011)


wrote a paper.In this paper authors described that Äúcloud computing
is a new computing paradigm for the provisioning, delivery and con
sumption of IT resources and services on the Internet. This computing
paradigm comes with huge benefits such as cost savings, increased re
silience and service availability, improved IT operations efficiency and
flexibility. However, most research cites security concerns as one of
the biggest challenges for most of these organizations. This has led to
fallacy or misconception about security challenges of the cloud which
needs to be clarified. This is a call for more research to separate reality
from the hype. Hence, this paper aims to separate justified security
concerns from the hype, fear of the unknown and confusion that cur
rently prevails within cloud computing. This paper aims to advance the
current discussions on cloud computing security in order to clear the
foggy cloud hovering over such a promising technology development. It

IX
Xseeks to inform and make decision makers aware of the real pertinent
and justified security issues within cloud computingÄù.

3. Stolfo, Salvatore J., et al. (2012)


described in their paper that Äúcloud computing promises to signif-
icantly change the way we use computers and access and store our
personal and business information. With these new computing and
communications paradigms arise new data security challenges. Existing
data protection mechanisms such as encryption have failed in prevent-
ing data theft at tacks, especially those perpetrated by an insider to the
cloud provider. They proposed a different approach for securing data
in the cloud using offensive decoy technology. They monitored data
access in the cloud and detect abnormal data access patterns. When
unauthorized access is suspected and then verified using challenge ques-
tions, we launch a disinformation attack by returning large amounts of
decoy information to the attacker. This protects against the misuse of
the userÄôs real data. Experiments conducted in a local file setting
provide evidence that this approach may provide unprecedented levels
of user data security in a Cloud environmentÄù.

X
Chapter 3

PROBLEM DEFINITION
AND SCOPE

3.1 PROBLEM DEFINITION


In cloud computing there are many loopholes like high power consumption,
requires high band width and requires high latency.These problems are iden-
tified and overcome by the use fog computing[5].

3.2 SCOPE
Fog computing acts as a companion to a cloud as it supports in handling
time-sensitive data locally Äı̀ at the edge of the network[5]. Processing the
data closer to where it originated helps keep the storage and processing needs
of the core processing center low while making processes much quicker.

3.3 OBJECTIVE
The most important goal of fog computing is to improve efficiency and reduce
the amount of data that needs to be transported to the cloud for processing,
analysis and storage[1]. Although this is mostly done for efficiency reasons,
it can also be done for security and compliance reasons.

XI
Chapter 4

ARCHITECTURE

The diagram represents how clouds works,and how we can use fog computing
with the help of nodes.

4.1 SYSTEM ARCHITECTURE

4.2 TERMINOLOGY
4.2.1 How fog computing works
Fog networking complements – doesn’t replace – cloud computing; fogging
enables short-term analytics at the edge, while the cloud performs resource-
intensive, longer-term analytics. Although edge devices and sensors are where
data is generated and collected, they sometimes don’t have the compute and
storage resources to perform advanced analytics and machine learning tasks.
Though cloud servers have the power to do this, they are often too far away
to process the data and respond in a timely manner.

4.2.2 Bandwidth conservation


Fog computing reduces the volume of data that is sent to the cloud, thereby
reducing bandwidth consumption and related costs.

XII
Figure 4.1: System Architecture

XIII
4.2.3 Improved response time.
Because the initial data processing occurs near the data, latency is reduced,
and overall responsiveness is improved. The goal is to provide millisecond-
level responsiveness, enabling data to be processed in near-real time.

4.2.4 Network-agnostic.
Although fog computing generally places compute resources at the LAN level
– as opposed to the device level, which is the case with edge computing – the
network could be considered part of the fog computing architecture. At the
same time, though, fog computing is network-agnostic in the sense that the
network can be wired, Wi-Fi or even 5G.

4.2.5 Physical location.


Because fog computing is tied to a physical location, it undermines some of
the ”anytime/anywhere” benefits associated with cloud computing.

4.2.6 Potential security issues.


Under the right circumstances, fog computing can be subject to security
issues, such as Internet Protocol (IP) address spoofing or man in the middle
(MitM) attacks.

4.2.7 Startup costs


Data Visualization is used to communicate information clearly and efficiently
to users by the usage of information graphics such as tables and charts. It
helps users in analyzing a large amount of data in a simpler way. It makes
complex data more accessible, understandable, and usable.

4.2.8 Ambiguous concept


Even though fog computing has been around for several years, there is still
some ambiguity around the definition of fog computing with various vendors
defining fog computing differently.

XIV
Chapter 5

RESULT ANALYSIS

5.1 DATASET USED


This are some commonly used data sets to tey machine algorithms in data
science.
1. A Fog hierarchical architecture includes three tiers called Cloud, Fog,
and Things [2]. The Cloud Tier comprises one or more Data Centers for
providing services that consume many computational resources (e.g.,
big data analysis). The Fog Tier includes Fog Nodes (FNs).
2. Unlike the traditional Fog-based architectures, our architecture sep-
arates the Fog Tier into two layers: categorizing resources in layers
depending on domain requirements leads to improve IoT reliability by
properly[7] locating management service.
3. Credit Card Approval Äı̂ A binary classification task for good or bad
credit scores, if the people can be a risk for defaulting credit card loans.
4. Rock Paper ScissorsÄı̂ Image classification for those three classes

5.2 RESULT ANALYSIS


Much scientific research is based on the gathering and analysis of measure-
ment data. Scientific data-sets are, at least, intermediate results in many
scientific research projects.Data sets are a collection of instances that all
share a common attribute[1]. Once feed these training and validation sets
into the system, subsequent data sets can then be used to sculpt machine
learning model going forward. The more data you provide to the ML sys-
tem, the faster that model can learn and improve. Using data set makes the

XV
machine learning model more efficient.These machine models can be used in
many applications to boost the companies

XVI
Chapter 6

ADVANTAGES
DISADVANTAGES

6.1 ADVANTAGES
• Fog computing provides better computing expercience.

• It reqired low latency and low power consumption.

• It also provide mobility and security.

6.2 DISADVANTAGES
• Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.

• It does not verify whether the user was authorized or not .

• Does not focus on ways of secure the data from unauthorized access.

6.3 APPLICATIONS
In a cloud-based management system, Fog Computing functions better to
provide control and deeper analysis across a variety of nodes. Wind elec-
tricity, transportation, smart cities, security, and smart buildings are among
others[2].

XVII
6.3.1 SURGE PRICE
To create the most efficient market and maximize the number of rides it
can provide Äı̀cab services uses surge pricing.Data Science is at the heart
of Cab services’s surge pricing algorithm[8].Data science methodologies are
extensively used to analyse the short term effects of surge pricing on customer
demand and long term effects of surge pricing on retaining customers[9]. Cab
services depends on regression analysis to find out which neighbourhoods will
be the busiest so it can activate surge pricing to get more drivers on the
roads[9].

6.3.2 MATCHING ALGORITHM


Given a pickup location, drop off location and time of the day, predictive
models developed at businesses predict how long will it take for a driver
to cover the distance. Cab service’s follows a supplier pick map matching
algorithm where the customer selects the variables associated with a service
(usually app) and makes a match by sending requests to the most optimal list
of service providers[9]. Any ride request is first sent to the nearest available
driver (the nearest available driver is determined by comparing the customer
location with the expected time of arrival of the driver). The driver then
accepts or rejects a ride request.

6.3.3 FARE ESTIMATES


Fog computing is a complex environment, where services are provided to
users, and users execute their applications. The acquisition of services or
resources depends on the participating nodes and their roles as providers or
users and always involves the notion of cost. Various aspects of fog computing
costs have been considered and cost-aware schemes have been proposed for
resource allocation, simulations tools, or modeling tools [36,37]. Battula et
al. propose a cost model for fog computing environments which concerns
both devices and applications.

XVIII
Chapter 7

CONCLUSION

7.1 CONCLUSION
In this work, we proposed a low-cost, Flexible system which will find out dif
ferent parameters like Low power, Low latency,Mobility,Security, and Better
computing experience.

XIX
Chapter 8

REFERENCES

[1] D. Poola , M.A. Salehi, K. Ramamohanarao and R. Buyya , ÄúFog com-


puting: A taxonomy , survey and future directionÄù, Internet of Every-
thing(pp. 103-130). Springer, 2016.
[2] S. Delfin, S.P. Sivansekar,N. Raj and A. Anand,ÄùFog computing:A new
era of cloud computing,Äù2019 3rd International conference on Comput ing
Methodologies and Communication(ICCMC).IEEE, 2019.
[3]A. Khakimov, A. Muthanna and M. S. A. Muthanna, ÄúStudy of fog
Computing structure.Äù IEEE Conference of Russian Young Reasearchers
in Electrical and Electronics Engineering.IEEE,2018.
[4]Seyedeh Solmaz Madani1, Shahram Jamali, ”A COMPARATIVE STUDY
OF FAULT TOLERANCE TECHNIQUES IN CLOUD COMPUTING”
[5]David Berbach, ”A Research Perspective on Fog Computing”,2017
[6]Poonam Verma,”An Overview of Fog Computing in the Present Scenario”,IEEE,2017.
[7]Moonmoon Chakraborty, ”Fog Computing Vs. Cloud Computing”,2016

XX

You might also like