49
This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Angelo Corsaro, PhD Chief Technology Officer [email protected] Fog Computing with VORTEX

Fog Computing with Vortex

Embed Size (px)

Citation preview

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Angelo Corsaro, PhDChief Technology Officer

[email protected]

Fog Computingwith VORTEX

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Why do we need Fog Computing?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

The majority of IoT systems are today cloud-centric

These systems are characterised by device-to-

cloud communication and in-cloud analytics

Cloud-Centric Architectures

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

*IDC

*CISCOThe number of IoT devices is expected to grow

exponentially

Too many Devices

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

*IDC

*CISCOCISCO estimates an average of 6.6 devices per person leading to 50B devices in

2020.

Too many Devices

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

*IDC

*CISCO

IDC estimates 27.9 devices per person leading to 212B

Too many Devices

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Industrial IoT applications such as Smart Grids , Smart

Factories, Smart Farming, Connected Vehicles and Smart

Cities are not compatible with the assumptions of Cloud

Centric Architectures

Industrial IoT

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

There is sufficient bandwidth to push data to

the Cloud.

Cloud-Centric Architectures Assumption #1

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Smart Factory0.5 TB of data

produced per day

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryConnectivity is not an

issue. A device will (almost) always be connected to the

cloud.

Cloud-Centric Architectures Assumption #2

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Autonomous Vehicles

coordination of fast moving autonomous vehicles

intermittent connectivity

dynamic pairing of devices

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryThe latency induced by

cloud-centralised analytics and control is compatible

with the dynamic of the IoT system

Cloud-Centric Architectures Assumption #3

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryLatency Constraints

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

The connectivity cost is negligible

Cloud-Centric Architectures Assumption #4

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryIndustrial companies are

comfortable in exposing their data to the cloud.

Cloud-Centric Architectures Assumption #5

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

What is Fog Computing?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but closer to the “Things”

Fog Computing| fɒg kəmˈpjuːtɪŋ|

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryelastic and high-performance computing, storage and communication at the edge

Fog Computing| fɒg kəmˈpjuːtɪŋ|

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Fog is about reactive cyber-physical applications

Fog is about interacting with the physical world

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Cloud technologies are not always applicable on the edge because of

performance and resource constraints

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

A new infrastructure has to be "invented" for the edge, innovating when necessary

and reusing when possible

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Real-Time Performance and Reliability

Location- and Resource-Aware deployment

Resource and Device Virtualisation

Fog Computing traits

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryResource aware provisioning

of applications and tenants

Tamper Proof Security (in some deployments it is easier

to get physical access to the fog platform)

Fog Computing traits

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryHas it been proven?

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Fog Computing with Vortex

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices

in151 Characters

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryFog ComputingVortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex lets data flow where

needed transparently while optimising the data sharing

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

Location Transparency

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryWhenever possible data is

shared using Device-to-Device communication

Location Transparency

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryWhen necessary data

sharing is mediated by Vortex Infrastructure, i.e.,

Vortex Fog and Cloud

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

Location Transparency

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

location transparency

Cloud Computing

Fog Computing

Device-to-Cloud Communication

Device-to-Device Communication

Fog-to-Cloud Communication

Cloud-to-Cloud Communication

Device-to-Device Communication

Collect | Store | Analyse | Share

Collect | Store | Analyse | Share

Fog Computing

Fog Computing

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

PerformanceVortex delivers low and

deterministic latency as well as very high throughput

30 μs peer-to-peer latency

4+ Mmsgs/sec p2p throughput

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Native Integration with the hottest real-time analytics

platforms and CEP

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

Analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

SecurityData-Level security with Pluggable Authentication Access Control and Crypto

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

structure

sdk

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car

Café and Web are typically used Android / HTML5 based infotainment

Lite in typically used in ECU, sensors and onboard analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car

Vortex Fog also helps defining security boundaries and policies

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog efficiently and securely deals with car to car communication

Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols

Device-to-Cloud Communication

Cloud Analytics

Fog AnalyticsFog Analytics

Fog Analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale

Device-to-Cloud Communication

Cloud Analytics

Fog AnalyticsFog Analytics

Fog Analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Fog Computing will underpin the largest majority of IoT systems

Fog Computing Platforms are starting to emerge in the market

Vortex is the only Data-Sharing Technology that is Fog-Ready

In Summary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Fog Computing Blog

http://bit.ly/fogblog-part-i

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary