Upload
angelo-corsaro
View
254
Download
0
Embed Size (px)
Citation preview
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
AngeloCorsaro,PhDChiefTechnologyOfficerADLINKTechnologiesInc.
Fog Computing Defined
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryState of Practice
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The majority of IoT systems are today cloud-centric
These systems are characterised by device-to-
cloud communication and in-cloud analytics
Cloud-Centric Architectures
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Why do we need Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
Too many DevicesThe number of IoT devices is
expected to grow exponentially
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial IoT applications such as Smart Grids , Smart
Factories, Smart Farming, Connected Vehicles and Smart
Cities are not compatible with the assumptions of Cloud
Centric Architectures
Industrial IoT
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
There is sufficient bandwidth to push data to
the Cloud.
Cloud-Centric Architectures Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory0.5 TB of data
produced per day
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryConnectivity is not an
issue. A device will (almost) always be connected to the
cloud.
Cloud-Centric Architectures Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous Vehicles
coordination of fast moving autonomous vehicles
intermittent connectivity
dynamic pairing of devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryThe latency induced by
cloud-centralised analytics and control is compatible
with the dynamic of the IoT system
Cloud-Centric Architectures Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryLatency Constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The connectivity cost is negligible
Cloud-Centric Architectures Assumption #4
Cost of connectivity is an issue in Smart Grids as the operator has to pay for the
2G/3G/4G data-link
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryIndustrial companies are
comfortable in exposing their data to the cloud.
Cloud-Centric Architectures Assumption #5
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
What is Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like cloud computing but closer to the “Things”
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that distributes computing, storage, control and
networking functions closer to the users along a cloud-to-thing continuum
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog is about reactive cyber-physical applications
Fog is about interacting with the physical world
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Cloud technologies are not always applicable on the edge because of
performance and resource constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
A new infrastructure has to be "invented" for the edge, innovating when necessary
and reusing when possible
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Real-Time Performance and Reliability
Location- and Resource-Aware deployment
Resource and Device Virtualisation
Fog Computing traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryResource aware provisioning
of applications and tenants
Tamper Proof Security (in some deployments it is easier
to get physical access to the fog platform)
Fog Computing traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
[source: OpenFog Whitepaper http://bit.ly/openfog-wp]
Open Fog
The recently established OpenFog is accelerating and facilitating the expansion, convergence and interoperability of Fog computing stacks
Consortium
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Open Fog Reference Architecture
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryHas it been proven?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Barcelona Smart City Platform
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryMEC
MEC is a network architecture concept that enables Integrated networking, computing and storage resources into one programmable and unified edge infrastructure.
Mobile/Multi-access Edge Computing (MEC)
The basic idea behind MEC is that by running applications and performing related processing tasks closer to the cellular customer, network congestion is reduced and applications perform better.
MEC
Fog vs. MEC
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core
The MEC infrastructure resides at the edge of the operator infrastructure.
The operator own and manages the infrastructure but not the “things”
MEC Boundaries
User Terminal, Things, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The Fog infrastructure resides on premises and at the edge of end-system infrastructure.
The fog infrastructure as well as the “things” are often owned and managed by the same authority, i.e. smart factory, smart grid, etc.
FOG Boundaries
FogExternalNetwork
Things, Machines, User Terminal, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core Fog
Things, Machines, User Terminal, …
The Fog and MEC infrastructure exist within different administrative boundaries
The ability of leveraging Fog, on premises, and MEC at the edge of the network, will be the ideal situation for demanding IIoT applications
FOG / MEC Boundaries
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
5G and MEC focus on Real-Fast
Beside the real-fast Fog has to support Real-Time
Real-Time and Real-Fast are not the same!
Real-Fast vs. Real-Time
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
0
1
2
3
4
5
Latency
Throughput
Real-T
ime
Multi-Te
nancy
Security
High Availa
bility
Manag
eabilit
y
Hethero
geneit
y
MECFOG
From an high level perspective MEC and Fog computing aim
at virtualising compute, storage and networking at the
edge
Yet, their requirements differ significantly in some areas as Fog computing deals with OT
systems
MEC / Fog Needs
Summing UPMEC and Fog Computing aims at the same high level goal, which is providing a virtualised compute, storage and communication fabric
Yet they have unique requirements stemming from the target application domain
Platform that wish to address and unify MEC and Fog computing need to exploit similarities but more importantly address the differences
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary