Upload
angelo-corsaro
View
1.162
Download
0
Embed Size (px)
Citation preview
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Angelo Corsaro, PhDChief Technology Officer
Fog Computingwith VORTEX
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Why do we need Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The majority of IoT systems are today cloud-centric
These systems are characterised by device-to-
cloud communication and in-cloud analytics
Cloud-Centric Architectures
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCOThe number of IoT devices is expected to grow
exponentially
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCOCISCO estimates an average of 6.6 devices per person leading to 50B devices in
2020.
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
IDC estimates 27.9 devices per person leading to 212B
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial IoT applications such as Smart Grids , Smart
Factories, Smart Farming, Connected Vehicles and Smart
Cities are not compatible with the assumptions of Cloud
Centric Architectures
Industrial IoT
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
There is sufficient bandwidth to push data to
the Cloud.
Cloud-Centric Architectures Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory0.5 TB of data
produced per day
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryConnectivity is not an
issue. A device will (almost) always be connected to the
cloud.
Cloud-Centric Architectures Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous Vehicles
coordination of fast moving autonomous vehicles
intermittent connectivity
dynamic pairing of devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryThe latency induced by
cloud-centralised analytics and control is compatible
with the dynamic of the IoT system
Cloud-Centric Architectures Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryLatency Constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The connectivity cost is negligible
Cloud-Centric Architectures Assumption #4
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryIndustrial companies are
comfortable in exposing their data to the cloud.
Cloud-Centric Architectures Assumption #5
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
What is Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like cloud computing but closer to the “Things”
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryelastic and high-performance computing, storage and communication at the edge
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog is about reactive cyber-physical applications
Fog is about interacting with the physical world
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Cloud technologies are not always applicable on the edge because of
performance and resource constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
A new infrastructure has to be "invented" for the edge, innovating when necessary
and reusing when possible
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Real-Time Performance and Reliability
Location- and Resource-Aware deployment
Resource and Device Virtualisation
Fog Computing traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryResource aware provisioning
of applications and tenants
Tamper Proof Security (in some deployments it is easier
to get physical access to the fog platform)
Fog Computing traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryHas it been proven?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing with Vortex
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices
in151 Characters
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryFog ComputingVortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex lets data flow where
needed transparently while optimising the data sharing
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
Location Transparency
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryWhenever possible data is
shared using Device-to-Device communication
Location Transparency
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryWhen necessary data
sharing is mediated by Vortex Infrastructure, i.e.,
Vortex Fog and Cloud
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
Location Transparency
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
location transparency
Cloud Computing
Fog Computing
Device-to-Cloud Communication
Device-to-Device Communication
Fog-to-Cloud Communication
Cloud-to-Cloud Communication
Device-to-Device Communication
Collect | Store | Analyse | Share
Collect | Store | Analyse | Share
Fog Computing
Fog Computing
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
PerformanceVortex delivers low and
deterministic latency as well as very high throughput
30 μs peer-to-peer latency
4+ Mmsgs/sec p2p throughput
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Native Integration with the hottest real-time analytics
platforms and CEP
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
SecurityData-Level security with Pluggable Authentication Access Control and Crypto
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
structure
sdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car
Café and Web are typically used Android / HTML5 based infotainment
Lite in typically used in ECU, sensors and onboard analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car
Vortex Fog also helps defining security boundaries and policies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and securely deals with car to car communication
Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols
Device-to-Cloud Communication
Cloud Analytics
Fog AnalyticsFog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale
Device-to-Cloud Communication
Cloud Analytics
Fog AnalyticsFog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing will underpin the largest majority of IoT systems
Fog Computing Platforms are starting to emerge in the market
Vortex is the only Data-Sharing Technology that is Fog-Ready
In Summary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing Blog
http://bit.ly/fogblog-part-i