Fog Computing Defined

Preview:

Citation preview

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

AngeloCorsaro,PhDChiefTechnologyOfficerADLINKTechnologiesInc.

angelo.corsaro@adlinktech.com

Fog Computing Defined

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryState of Practice

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

The majority of IoT systems are today cloud-centric

These systems are characterised by device-to-

cloud communication and in-cloud analytics

Cloud-Centric Architectures

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Why do we need Fog Computing?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

*IDC

*CISCO

Too many DevicesThe number of IoT devices is

expected to grow exponentially

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Industrial IoT applications such as Smart Grids , Smart

Factories, Smart Farming, Connected Vehicles and Smart

Cities are not compatible with the assumptions of Cloud

Centric Architectures

Industrial IoT

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

There is sufficient bandwidth to push data to

the Cloud.

Cloud-Centric Architectures Assumption #1

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Smart Factory0.5 TB of data

produced per day

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryConnectivity is not an

issue. A device will (almost) always be connected to the

cloud.

Cloud-Centric Architectures Assumption #2

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Autonomous Vehicles

coordination of fast moving autonomous vehicles

intermittent connectivity

dynamic pairing of devices

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryThe latency induced by

cloud-centralised analytics and control is compatible

with the dynamic of the IoT system

Cloud-Centric Architectures Assumption #3

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryLatency Constraints

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

The connectivity cost is negligible

Cloud-Centric Architectures Assumption #4

Cost of connectivity is an issue in Smart Grids as the operator has to pay for the

2G/3G/4G data-link

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryIndustrial companies are

comfortable in exposing their data to the cloud.

Cloud-Centric Architectures Assumption #5

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

What is Fog Computing?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but closer to the “Things”

Fog Computing| fɒg kəmˈpjuːtɪŋ|

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that distributes computing, storage, control and

networking functions closer to the users along a cloud-to-thing continuum

Fog Computing| fɒg kəmˈpjuːtɪŋ|

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Fog is about reactive cyber-physical applications

Fog is about interacting with the physical world

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Cloud technologies are not always applicable on the edge because of

performance and resource constraints

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

A new infrastructure has to be "invented" for the edge, innovating when necessary

and reusing when possible

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Real-Time Performance and Reliability

Location- and Resource-Aware deployment

Resource and Device Virtualisation

Fog Computing traits

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryResource aware provisioning

of applications and tenants

Tamper Proof Security (in some deployments it is easier

to get physical access to the fog platform)

Fog Computing traits

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

[source: OpenFog Whitepaper http://bit.ly/openfog-wp]

Open Fog

The recently established OpenFog is accelerating and facilitating the expansion, convergence and interoperability of Fog computing stacks

Consortium

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Open Fog Reference Architecture

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryHas it been proven?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Barcelona Smart City Platform

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryMEC

MEC is a network architecture concept that enables Integrated networking, computing and storage resources into one programmable and unified edge infrastructure.

Mobile/Multi-access Edge Computing (MEC)

The basic idea behind MEC is that by running applications and performing related processing tasks closer to the cellular customer, network congestion is reduced and applications perform better.

MEC

Fog vs. MEC

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

MECNet-Core

The MEC infrastructure resides at the edge of the operator infrastructure.

The operator own and manages the infrastructure but not the “things”

MEC Boundaries

User Terminal, Things, …

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

The Fog infrastructure resides on premises and at the edge of end-system infrastructure.

The fog infrastructure as well as the “things” are often owned and managed by the same authority, i.e. smart factory, smart grid, etc.

FOG Boundaries

FogExternalNetwork

Things, Machines, User Terminal, …

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

MECNet-Core Fog

Things, Machines, User Terminal, …

The Fog and MEC infrastructure exist within different administrative boundaries

The ability of leveraging Fog, on premises, and MEC at the edge of the network, will be the ideal situation for demanding IIoT applications

FOG / MEC Boundaries

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

5G and MEC focus on Real-Fast

Beside the real-fast Fog has to support Real-Time

Real-Time and Real-Fast are not the same!

Real-Fast vs. Real-Time

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

0

1

2

3

4

5

Latency

Throughput

Real-T

ime

Multi-Te

nancy

Security

High Availa

bility

Manag

eabilit

y

Hethero

geneit

y

MECFOG

From an high level perspective MEC and Fog computing aim

at virtualising compute, storage and networking at the

edge

Yet, their requirements differ significantly in some areas as Fog computing deals with OT

systems

MEC / Fog Needs

Summing UPMEC and Fog Computing aims at the same high level goal, which is providing a virtualised compute, storage and communication fabric

Yet they have unique requirements stemming from the target application domain

Platform that wish to address and unify MEC and Fog computing need to exploit similarities but more importantly address the differences

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Recommended