100% found this document useful (1 vote)
99 views2 pages

Introduction To Fog Computing

This document outlines an introduction to fog computing course. The course aims to enhance students' knowledge of fog computing and its applications in areas like wearable computing. The course objectives are to understand fog computing architecture, implement fog computing protocols, and analyze security risks. The course covers topics like fog computing definitions and characteristics, architecture, protocols, data management and security analysis. Case studies on applications like smart traffic lights and wearable devices are also included.

Uploaded by

kandasamy A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
99 views2 pages

Introduction To Fog Computing

This document outlines an introduction to fog computing course. The course aims to enhance students' knowledge of fog computing and its applications in areas like wearable computing. The course objectives are to understand fog computing architecture, implement fog computing protocols, and analyze security risks. The course covers topics like fog computing definitions and characteristics, architecture, protocols, data management and security analysis. Case studies on applications like smart traffic lights and wearable devices are also included.

Uploaded by

kandasamy A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

INTRODUCTION TO FOG COMPUTING

Prerequisite
Course ● To extend the students' knowledge of fog computing & edge computing
Objectives
● To enhance their expertise in area of wearable computing enjoinment
● To carry out real life application of fog computing
Course Upon completion of this course, Students should be able
Outcomes
 Understand fog computing
 Know architecture of fog computing
 Implement fog computing protocols
 Do security risk analysis
 Know various industry based application of fog computing
UNIT I INTRODUCTION TO FOG COMPUTING
Fog Computing-Definition-Characteristics-Application Scenarios - Issues –Fog. Computing and
Internet of Things-Pros and Cons-Myths of Fog Computing -Need and Reasons for Fog
Computing Fog Computing and Edge Computing-IoT, FOG, Cloud Benefits
UNIT II ARCHITECTURE
Working Procedure -Performance Evaluation Components- Software Systems – Architecture-
Modeling and Simulation –Challenges.
UNIT III FOG PROTOCOLS
Fog Protocol-Fog Kit- Proximity Detection Protocols- DDS/RTPS computing protocols.
UNIT IV MANAGEMENT OF DATA AND SECURITY ANALYSIS:
Smart Management of Big Data-Smart Data-Structure of Smart Data- Smart Data Life. Cycle-
System Architecture-Multi-dimensional Payment Plan- -Security and Privacy. Issues-
Multimedia Fog Computing-Architecture-Deduplication-Hybrid Secure. Deduplication-
Security Challenges-Security Requirements.
UNIT V CASE STUDY:
Case Study: Wind Farm - Smart Traffic Light System, Wearable Sensing. Devices, Wearable
Event Device, Wearable System, Demonstrations, Post. Application Example. Event
Applications Example
Text Books
1. Assad Abbas, Samee U. Khan "Fog Computing: Theory and Practice " wiley India
May2020
References
1. Stojan Kitanov (Mother Teresa University, Macedonia)"Introduction to Fog
Computing" IGI Global Publication.
2. Ivan Stojmenovic, Sheng Wen ,” The Fog Computing Paradigm: Scenarios and
Security Issues” Proceedings of the 2014 Federated Conference on Computer Science
and Information Systems pp. 1–8.
3. Fog Computing: Helping the Internet of Things Realize its Potential Amir Vahid
Dastjerdi and Rajkumar Buyya, University of Melbourne.
4. Farhoud Hosseinpour,Juha Plosila,Hannu Tenhunen,“An Approach for Smart
management of Big Data in the Fog Computing Context”, IEEE 8th International
Conference on Cloud Computing Technology and Science,2016

You might also like