International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133

Comparative Studies | Computer Science & Engineering | India | Volume 5 Issue 12, December 2016


Comparison of Divergent Technologies of Fog Computing

Shivangi Bhardwaj


Abstract: The Fog Computing technology is used for security and an extension to cloud computing. Fog Computing provides services to near edges which are end users through Internet. The applications of fog computing exist in mobile networks as well as in optimization of websites. This new technology provides low latency and location awareness and has wide-spread geographical distribution, supports mobility. The important task of fog is to position the data near the user that is the edge of the network. Fog Computing is also known as Edge Computing. This paper discusses the wide spectrum of fog computing technologies and its relation with cloud computing.


Keywords: Fog Computing, Cloud Computing, Edge Computing, Security, IoT


Edition: Volume 5 Issue 12, December 2016,


Pages: 522 - 524


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shivangi Bhardwaj, "Comparison of Divergent Technologies of Fog Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 522-524, https://www.ijsr.net/get_abstract.php?paper_id=ART20163492

Similar Articles with Keyword 'Fog Computing'

Downloads: 0

Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 1, January 2024

Pages: 324 - 329

Optimizing Data Centers for Sustainability: The Role of Serverless Fog Computing in Artificial Intelligence

Jatin Pal Singh [3]

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil | Dr. Sujata Terdal [2]

Share this Article
Top