SlideShare a Scribd company logo
Advanced Technology Office
28 rue Jean Rostand
91400, Orsay
France
Angelo	Corsaro,	PhD
Chief	Technology	Officer	
ADLINK	Tech.	Inc.	
angelo.corsaro@adlinktech.com
AT()
BREAKING the EdgeA Journey Through Cloud, Edge and Fog Computing
State of Practice
Innovating Together
Infrastructure
Hardware Tiers in IoT
A generic IoT/IIoT system has three
different hardware tiers
Off-premises data-centre which
may be private or public
On-premises edge infrastructure
Things with computational,
communication and storage
capacity
Hardware Tiers in IoT
The key architectural variations
that are discussed today all
depends on the bias, or lack
of thereof, on a specific tier
Cloud Centric
Architectures
Cloud Centric Architectures
The majority of IoT (and
Telco infrastructures)
systems are today cloud-
centric
These systems are
characterised by device-
to-cloud communication
and in-cloud analytics
Cloud Centric Perspective
The IoT application is
deployed, managed
and monitored using
the Cloud IaaS
infrastructure
Cloud-Centric Perspective
The early days of IoT/IIoT have been
biased by a cloud centric
perspective
The cloud infrastructure is mature
and operationally convenient…
Yet cloud centric architectures
don’t fit well for a large class of
IoT/IIoT applications
Cloud Centric
Architectures
Challenges
Cloud Computing
There is sufficient
bandwidth to push data to
the Cloud.
Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory
0.5 TB of data
produced per
day
Cloud Computing
Connectivity is not an
issue. A device will (almost)
always be connected to the
cloud.
Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Searching Operator…
Cloud Computing
The latency induced by
cloud-centralised analytics
and control is compatible
with the system’s dynamic
Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous
Vehicles
coordination of fast
moving autonomous
vehicles
intermittent
connectivity
dynamic pairing of
devices
Cloud Computing
The connectivity cost is
negligible
Assumption #4
Cost of connectivity is an
issue in Smart Grids as
the operator has to pay for
the 2G/3G/4G data-link
Cloud Computing
Companies are
comfortable with exposing
their data to the cloud.
Assumption #5
ARE YOU
SURE?
Edge-Centric
Architectures
Edge-Centric Perspective
The main idea of Edge-
Centric architecture is that of
providing edge-clouds to
reduce some of the short-
comings of traditional Cloud
Centric architectures
Edge-Centric Perspective
The application is
deployed, managed
and monitored using
the Cloud IaaS
infrastructure which
cooperates with edge
Cloud infra.
Edging the Edge
The Fuzzy Edge
The edge is an extremely fuzzy concept as it depends
entirely from infrastructure ownership structure and
application domain.
What’s the edge in the image below?
MEC
InfraNet-Core
EDGE
Infra
Things, Machines,
User Terminal, …
Hamletic Moment
To edge, or not to edge: that is the question:
Whether ‘tis nobler in the mind to suffer
The slings and arrows of outrageous boundaries,
Or to take arms against a sea of edges,
And by opposing end them?
Reflection Time…
Cloud, Edge, and Things
Cloud Computing gives operationally convenient abstractions
and tools to manage and provision data-centre resources
Edge Computing alleviates some of the challenges posed by
cloud computing at the cost of introducing some fragmentation
in the infrastructure.
But how about the Things? In a large class of system we need to
manage and provision them too…
What’s Really Needed?
A scalable, location
transparent, data-
centric layer that allows
us to effectively get the
data where needed
while minimising
resource usage
1
What’s Really Needed?
A geo-distributed, location
transparent, storage
infrastructure that allows
us to store data where it
makes sense to support
local computing while
maintaining location
transparent access to it.
2
Home/Building Management – Edge Computing
As we tackle the problem,
it would also make sense
to address edge
computing and ensure
that our solution will allow
for location transparent
and uniform access to
data even if that is living
on the edge.
What’s Really Needed?
3
An infrastructure that
allows us to federate
compute, storage, I/O
and communication
resources regardless of
their location (Fog
Infrastructure)
Filling the Gap
Connectivity
Internet protocol
For historical reasons, internet has
been built on a host-centric
communication model.
(machine-to-machine)
The Internet today
Most of the application on the
internet today are data / content
centric.
What matters to the user is the
data not as much who has it…
Internet protocol
The internet protocol is inherently
one-to-one. Broadcast and multicast
communications are not viable in wide
networks.
Thus the diffusion of the same data to
multiple consumers is very inefficient.
NDN / CCN
NDN is based on a data centric
networking paradigm.
Data samples are identified with
hierarchical names.
NDN is Inherently Pull and best suited
for static data.
Named Data Networking
Content Centric Networking
/com.adlink/fr/employees/olivier.hecart
DDS is a great data centric technology which embraces powerful concepts
like strong decoupling between publishers and subscribers.
But DDS has been designed for small to medium systems and suffers from
major scalability issues on larger systems.
It is push based which makes uneasy to retrieve specific data or to properly
filter data streams.
Data Distribution Service
The Internet of Tomorrow
With the raise of IoT, the
different devices connected to
the internet use very
heterogeneous networking
technologies (TCP/IP, BLE, 3G,
6LowPan, …).
Some endpoints are
extremely constrained w.r.t
computational, communication
resources as well as energy.
Internet scale data-centric protocol that
unifies data-sharing between any kind of
device including those constrained with
respect to the node resources, such as
computational resources and power, as well
as the network.
Conceptual Model
zenoh provides a data-centric
abstraction in which applications
can read and write data
autonomously and
asynchronously.
The data read and written by
zenoh applications is associated
with one or more resources
identified by a URI.
DDS Global Data Space
...
Data
Writer
Data
Writer
Data
Writer
Data
Reader
Data
Reader
Data
Reader
Data
Reader
Data
Writer
R1
R2
R i
Rn
-- These are Resources
/myhouse/floor/1/musicroom/LightStatus
/myhouse/floor/2/musicroom/LightStatus
/myhouse/floor/2/bedroom/erik/LightStatus
-- These are Selections
/myhouse/floor/2/bedroom/*/LightStatus
/myhouse/**/LightStatus
/myhouse/**
Conceptual Model
Data can be pushed to
subscribers and storages
and be queried from
storages.
zenoh
pub/sub protocol (push)
storage/query protocol (pull)
Publisher SubscriberStorage
write / stream subscribestore query
Conceptual Model
Data can be pushed-to,
pulled or queried-from
applications periodically
or asynchronously.
Routing
Adaptative,
fault tolerant,
brokering and routing.
Reliability & Ordering
Z1
Z2
Z6
Z3
Z5
Z4A1 A2
application-to-application reliability
first-to-last-broker
Zenoh supports 3 levels of reliability :
• Hop to hop reliability.
Ensures reliability and ordering
when NO failures.
• App-to-app reliability.
• First-to-last-broker reliability.
More scalable than app-to-app
reliability.
Zenoh clients
• Low footprint C client
• OCaml client
• Python client
• Bash client
A piece of code
Publisher :
z = zenoh.connect('127.0.0.1:7447')
pub = z.declare_publisher('/demo/hello')
pub.write('Hello world'.encode())
Subscriber :
z = zenoh.connect('127.0.0.1:7447')
z.declare_subscriber(‘/demo/**', lambda rid, data:
print('received {}'.format(data.tobytes().decode())))
Performance
Throughput
0
2500
5000
7500
10000
8 16 32 64 128 256 512 1024 2048 4096 8192 16384
zenoh Cyclone DDS
Mbps
Key Highlights
Key Highlights
Extremely Resource
Constrained Environments
Defined the most wire/power/memory efficient
protocol in the market to provide connectivity
to extremely constrained targets
Support for:
- Peer-to-peer and brokered communication
- Batched data and deltas
- Ordered reliability and fragmentation
- Queries
zenoh
zenoh
6LowPAN
802.15.4
BLE
2G/3G/
LTE
Unspecified API
App App App
…
Application
TCP UDP
IP
Key Highlights
Protocol implementation for a
8-bit micro-controllers takes
300 Bytes of RAM and has
wire-overhead of 4 bytes for
data samples
7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+
|R|S|P| SDATA |
+---------------+
~ SN ~
+---------------+
~ RID | SID ~
+---------------+
~ PRID ~
+---------------+
~ [Payload] ~
+---------------+
Storage
Home/Building Management
Imagine that we have a collection
of houses in a residence or
equivalently buildings on a business
park that we would like to monitor
and manage.
In other terms, we would like to
read, write and observe data
specic to the house/building.
More importantly we would want
to do this from anywhere.
//residence-1/house-1/kitchen/airquality
//residence-1/house-1/alert
//residence-1/house-1/utilities/electricity
//residence-1/house-1/laundry/washer/schedule
//residence-1/house-n/kitchen/airquality
//residence-1/house-n/alert
//residence-1/house-n/utilities/electricity
//residence-1/house-n/laundry/washer/schedule
...
Cloud Centric Home/Building Management
One solution is to push the data to
the Cloud
Applications can use the cloud as
the place to go and get or set any
information concerning our
house/buildings.
That is a very commont approach...
But, is this a solution to the
problem, or is it just delaying the
problem?
//residence-1/house-i/kitchen/airquality
//residence-1/house-i/alert
//residence-1/house-i/utilities/electricity
//residence-1/house-i/laundry/washer/schedule
Scaling Out
At some point scaling-up
won’t be a solution and we
will have to scale-out and
leverage multiple cloud
regions.
With multiple cloud
regions the unifed view of
the system is lost, and we
are back to the starting
point.
Home/Building Management – Edge Computing
As we tackle the problem,
it would also make sense
to address edge
computing and ensure
that our solution will allow
for location transparent
and uniform access to
data even if that is living
on the edge.
Introducing Yaks
YAKS provides a distributed
service that implements an
eventually consistent, scalable,
location transparent, high
performance, and distributed
key/value store with pluggable
back-ends and front-end.
YAKS is equipped with dynamic
discovery and supports extremely
well dynamic environments
YAKS data is globally accessible
without requiring local
replication as in traditional key/
value stores.
Home/Building Management with YAKS
Regardless of wether data
is the device, the edge
infrastructure or the cloud,
YAKS provides location
transparent access
through a distributed
key-value store
abstraction.
All the details concerning
how to get the data from
were it is to were it needs
to are handled by YAKS.
Architecture
YAKS Architecture
YAKS has a modular
architecture relying
on different kinds of
plugins
Engine
AccessControl
Crypto
Authetication
DBMS
…
Memory
Socket
…
REST
zenoh
Security Plugin
Backend Plugin
Transport Plugin
Frontend Plugin
GPS
Clock
Logical
C/C++
Go
Java
JavaScript
…
API
Deployment Topology
zenoh
zenoh
zenoh
zenoh
zenoh
zenoh routing infrastructure
zenoh
Abstractions
YAKS
YAKS is a distributed service to define, manage and
operate on key/value spaces
The key abstractions at the core of yaks are Path, Value,
Selector, Storage, Workspace, and Admin Space
YAKS Values
A YAKS Value is defined by the following tuple:
v = e, c, t
Where e is the encoding and c represents the content and t
is a logical timestamp used for ordering.
YAKS Path
A Path in YAKS is a string having the following format:
/s1/s2/…/sn
Where si does not contain wildcard characters such as ‘*’
and ‘**’
Example:
/com/adlink/factory/shanghai/line/1/machine/
/net/icorsaro/home/livingroom/lightbulb/10
YAKS Selector
A Selector in YAKS is the conjunction of an expression identifying a set of keys and
optionally a predicate on values
/se1/se2/…/sen [? [predicate] [(properties)]] [#projection]
Where:
• sei may contain wildcard characters such as ‘*’ and ‘**’
• the predicate has the form: f1 op v1 f2 op v2… fn op vn 

(where op can be , =, =, =,  and !=)
• the properties is a semicolon separated list of key=value
• the projection is a semicolon separated list of fields to project.
Example:
/net/icorsaro/home/*/lightbulb?luminosity50#id
/net/icorsaro/home/*/consumption/statistics?(start=yesterday;end=now)#average;std
Selector / Path matching
‘*’ to match 1 segment (full or partial):
Examples:
/home/bob/*/light
/home/bob/room*/light
/home/bob/*/light
matches
matches
doesn’t match
/home/bob/kitchen/light
/home/bob/room1/light
/home/bob/floor1/room2/light
Examples:
/home/bob/**/light
/home/bob/**
matches
also matches
/home/bob/kitchen/light
/home/bob/floor1/room2/light
/home/bob/floor2/room1/temp
‘**’ to match several segments (full):
YAKS Storage
A Storage in YAKS is defined by means of a selector s and
backend B. Where the back-end B may be one of
supported backends, such as main-memory, DBMS, etc.
A Storage with selector s will store path,value for which s
matches the path.
KV Space Operations
YAKS primitives to operate on the key/value space are:
• put, update, remove, get
• subscribe/unsubscribe
• register_eval/unregister_eval, eval
Put/Get
put
Data are published via
put/update.
Matching storages
receive and store the
data.
Later on, applications
can query the data
Put/Get
get
Data are published via
put/update.
Matching storages
receive and store the
data.
Later on, applications
can query the data
get
Subscriptions
subscribe
put
subscribe
Data are published via
put/update.
Yaks routes the
publications to all
matching subscribers.
Evals
register_eval
eval
Any application can
bind a computation
with a path.
Applications can trigger
the execution of these
functions by evaluating
the path.
Key Primitives
class Workspace(object):
def put(self, path, value)
def update(self, path, value)
def remove(self, path)
def get(self, selector)
def subscribe(self, selector, listener)
def unsubscribe(self, subscription_id)
def register_eval(self, path, callback)
def unregister_eval(self, path)
def eval(self, selector)
Play with it….
us-west.yaks.is

/demo/uswc/**
us-east.yaks.is

/demo/us-east/**
eu-central.yaks.is

/demo/eu/**
ap-southeast.yaks.is
/demo/ap/**
Example:
• Put data: curl -X PUT -d 'Hello World!' http://us-west.yaks.is:8000/demo/eu/test
• Get data: curl http://ap-southeast.yaks.is:8000/demo/*/test
Infrastructure
Management
Vision
fogOS aims at providing a
decentralised infrastructure for
provisioning and managing (1)
compute, (2) storage, (3)
communication and (3) I/O resources
available anywhere across the network.
fogOS addresses highly
heterogeneous systems even those with
extremely resource-constrained nodes.
— Decentralised Design
fogOS can manage and
provision any network
connected device on which it
agent is running
Its decentralised architecture
allows to manage the system
from anywhere and does not
need any specific set of nodes
running as “servers”
Architecture
Modules
Fog Infrastructure Manager
Virtualises the hardware infrastructure, such
as computational, communication, storage
and I/O resources, and abstract the key
primitives provided by system software, such
as the OS
Provides primitives for managing these
virtualised infrastructure
Provides infrastructure level monitoring
information.
Fog Atomic Entity Manager
(FAEM)
Fog Entity Orchestrator
Fog Infrastructure Manager
(FIM)
Modules
Fog Atomic Entity Manager
Manages the Fog Atomic Entity (FAE) life-cycle and
maps then into FDU to be deployed by the FIM.
Triggers the FAE specific monitoring plug-ins in
response to relevant events such as migration, failure,
etc.
This information may be used by the Fog Entity
Orchestrator (FEO) to trigger re-allocation, restart, etc. 

The main abstraction provided by the FAEM is the Fog
Atomic Entity
Fog Atomic Entity Manager
(FAEM)
Fog Entity Orchestrator
Fog Infrastructure Manager
(FIM)
Modules
Fog Entity Orchestrator
Validates the entity specification
Decides based on available resources and entity
constraints if it can be accepted.
Device an allocation of the entity that optimises
resource utilisation while satisfying the entity’s
functional and non-functional requirements
Executes the allocation by proper coordination with
the FAEM and FIM
Continuously monitors and reconfigures entity
allocation to ensure that the constraints are satisfied.
Fog Atomic Entity Manager
(FAEM)
Fog Entity Orchestrator
Fog Infrastructure Manager
(FIM)
Entity
An entity fragment is directed
acyclic graph of atomic entities. 

An entity is a directed acyclic
graph of atomic entities and
entity fragments. 

VM
C
UK C
BE UK
VM: Virtual Machine
C: Container
UK: Uni Kernel
BE: Binary Executable
uS: micro Service
uS
BE
UKUK
AT()
Information Model
fogOS’s information model
defines the describes associated
with nodes, entities and
networks.
Additionally it provides an
abstract way to describe
applications and relations
between them.
It is implemented as a set of
YANG Models.
AT()
Relation with ETSI NFV and MEC IM
fogOS information model is a
super-set of the ETSI (European
Telecommunications Standards
Institute) MEC and ETSI NFV
Specifically, fogOS supports the
declaration of I/O constraints.
YANG models have also been
defined for fogOS abstractions.
Architecture
fogOS is composed by:
NDN. At its lowest level, it leverages a Named Data
Network (NDN) infrastructure based on zenoh. DDS can
also be used as a transport — not necessarily an NDN
YAKS. A distributed key-value store that leverages the
NDN for scalability
Agent. The core logic of fogOS, it takes care of managing,
monitoring and orchestrating entities through plugins
Plugins. Plugins provide supports for atomic entities, OS,
networks, etc.
zenoh
YAKS
AgentPlugins
Network
Data Link
Physical
Transport
AT()
Plugins
fog 5 leverages plugins interact and manage:
Atomic Entities (Runtimes)
Networks
OSes
Monitoring
Resource Orchestration
Resource Management
For each type of plugin an interface has been defined.
For instance, plugins that manage atomic entities have
to implement the FSM for the kind of atomic entity
they will be managing.
zenoh
YAKS
AgentPlugins
Network
Data Link
Physical
Transport
Local/Global and Actual/Desired
fogOS uses YAKS to maintain
the actual and desired state
for global and node-specific
information
This separation ensures that
there is never write
concurrency on the actual
state and that the evolution is
entirely under the control of
the agent
Desired
Global Store
Actual
Global Store
Actual
node-local Store
Desired
node-local Store
AgentWorld
Actual
node-local
Constraint Store
Desired
node-local Constraint
Store
Plug-in 1
Plug-in 2
Plug-in N
Normal Node
MCU
MCU
MCU
Desired
Global Store
Actual
Global Store
Actual
node-local Store
Desired
node-local Store
Agent Plug-insWorld
AT()
Interact with fogOS
To interact with fogOS we provide a set
of API for Python3.
These API uses interact with fogOS
using the distributed data store.
The demo that we show uses this API.
API Docs: https://atolab.github.io/fog05-
doc/fog05.html#module-fog05.api
— The Eclipse Project
Since
June 2018
OpenFog and 5GPPP
fogOS is one of the infrastructure
identified as compliant with the 5G
principles and requirements by the EU
5GPPP working group
fogOS architecture is compatible with the
OpenFog Reference Architecture.
Additionally fogOS is used as the
reference fog platform in several test-beds
Users and Press
Mm2
Multi-access edge
platform manager - NFV
(MEPM-V)
MEAO
fog05
+
MEPM-V plugin
5GCity Components
ETSI NFV Components
ETSI MEC Components
Multilayer Orchestrator
Operation Support System
Os-Ma-nfvo
NFVO
VNFM
(ME app
LCM)
VNFM
(ME
platform
LCM)
Virtualisation Infrastructure Manager
Multi-access
edge
platform
(VNF)
NFVI
Data plane
(VFN/PNF)
Os-Ma-nfvo
Me app
(VNF)
Service
Mm5
Mp1
Mp2
Or-Vnfm
Or-Vi
Ve-Vnfm-vnf
Nf-Vi
Nf-Vn
Nf-Vn
Ve-Vnfm-em
Vi-Vnfm = Mm6
Mv3
Mv2
Mv1
ETSI NFV Reference points
ETSI MEC Reference points
ETSI NFV-MEC Reference points
• Mv1 ~ Os-Ma-nfvo
• Mv2 ~ Ve-Vnfm-em
• Mv3 ~ Ve-Vnfm-vnf
Mm3*
Mm1
fog05
+
MEAO plugin
Wrapping Up
Key Takeaways
Cloud Computing is operationally convenient but it has
several limitations that limit its applicability in a large class of
applications.
1
Key Takeaways
The Edge is fuzzy in essence and limiting by nature. We
should focus on infrastructure that allows to unify the
computational, communication, communication and I/O
resources end-to-end
2
Key Takeaways
The world outside of the data-center is constrained,
heterogeneous, and tricky. Yet, that’s the place where the
difference can be made.
3
Angelo	Corsaro,	PhD
Chief	Technology	Officer	
ADLINK	Tech.	Inc.	
angelo.corsaro@adlinktech.com
Innovating Together

More Related Content

What's hot

Edge Computing
Edge ComputingEdge Computing
Edge Computing
Vikas Yadav
 
Edge computing
Edge computingEdge computing
Edge computing
pramiidhaaavula
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
Cygnet Infotech
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
PriyaMaurya52
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
Mosin A
 
Fog computing
Fog computingFog computing
Fog computing
Ayush Chaurasia
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
Milanap1
 
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
William Liang
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
Tonex
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
Maria Gorlatova
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
Areej Qasrawi
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
Nitinder Mohan
 
Edge computing
Edge computingEdge computing
Edge computing
AbhayDhupar
 
Edge Computing Architecture using GPUs and Kubernetes
Edge Computing Architecture using GPUs and KubernetesEdge Computing Architecture using GPUs and Kubernetes
Edge Computing Architecture using GPUs and Kubernetes
VirtualTech Japan Inc.
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
Dinesh Kumar Wickramasinghe
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Rashid Ansari
 

What's hot (20)

Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Fog computing
Fog computingFog computing
Fog computing
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
 
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge Computing Architecture using GPUs and Kubernetes
Edge Computing Architecture using GPUs and KubernetesEdge Computing Architecture using GPUs and Kubernetes
Edge Computing Architecture using GPUs and Kubernetes
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

Similar to Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing

zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
MuhammadTalha563553
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
Thierry Coupaye
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
RemoMarconzini1
 
What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
Lorie Harris
 
Cloud computing
Cloud computingCloud computing
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
Wajiha Muhammad Ismail
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
Peter R. Egli
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
Cerebrum Infotech
 

Similar to Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing (20)

zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Fog computing
Fog computingFog computing
Fog computing
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 

More from Angelo Corsaro

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
Angelo Corsaro
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
Angelo Corsaro
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
Angelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Angelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
Angelo Corsaro
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
Angelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
Angelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
Angelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
Angelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
Angelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
Angelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
Angelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
Angelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
Angelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
Angelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
Angelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
Angelo Corsaro
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
Angelo Corsaro
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
Angelo Corsaro
 

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing

  • 1. Advanced Technology Office 28 rue Jean Rostand 91400, Orsay France Angelo Corsaro, PhD Chief Technology Officer ADLINK Tech. Inc. angelo.corsaro@adlinktech.com AT() BREAKING the EdgeA Journey Through Cloud, Edge and Fog Computing
  • 4. Hardware Tiers in IoT A generic IoT/IIoT system has three different hardware tiers Off-premises data-centre which may be private or public On-premises edge infrastructure Things with computational, communication and storage capacity
  • 5. Hardware Tiers in IoT The key architectural variations that are discussed today all depends on the bias, or lack of thereof, on a specific tier
  • 7. Cloud Centric Architectures The majority of IoT (and Telco infrastructures) systems are today cloud- centric These systems are characterised by device- to-cloud communication and in-cloud analytics
  • 8. Cloud Centric Perspective The IoT application is deployed, managed and monitored using the Cloud IaaS infrastructure
  • 9. Cloud-Centric Perspective The early days of IoT/IIoT have been biased by a cloud centric perspective The cloud infrastructure is mature and operationally convenient… Yet cloud centric architectures don’t fit well for a large class of IoT/IIoT applications
  • 11. Cloud Computing There is sufficient bandwidth to push data to the Cloud. Assumption #1
  • 12. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Smart Factory 0.5 TB of data produced per day
  • 13. Cloud Computing Connectivity is not an issue. A device will (almost) always be connected to the cloud. Assumption #2
  • 14. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Searching Operator…
  • 15. Cloud Computing The latency induced by cloud-centralised analytics and control is compatible with the system’s dynamic Assumption #3
  • 16. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Autonomous Vehicles coordination of fast moving autonomous vehicles intermittent connectivity dynamic pairing of devices
  • 17. Cloud Computing The connectivity cost is negligible Assumption #4
  • 18. Cost of connectivity is an issue in Smart Grids as the operator has to pay for the 2G/3G/4G data-link
  • 19. Cloud Computing Companies are comfortable with exposing their data to the cloud. Assumption #5
  • 22. Edge-Centric Perspective The main idea of Edge- Centric architecture is that of providing edge-clouds to reduce some of the short- comings of traditional Cloud Centric architectures
  • 23. Edge-Centric Perspective The application is deployed, managed and monitored using the Cloud IaaS infrastructure which cooperates with edge Cloud infra.
  • 25. The Fuzzy Edge The edge is an extremely fuzzy concept as it depends entirely from infrastructure ownership structure and application domain. What’s the edge in the image below? MEC InfraNet-Core EDGE Infra Things, Machines, User Terminal, …
  • 27. To edge, or not to edge: that is the question: Whether ‘tis nobler in the mind to suffer The slings and arrows of outrageous boundaries, Or to take arms against a sea of edges, And by opposing end them?
  • 29. Cloud, Edge, and Things Cloud Computing gives operationally convenient abstractions and tools to manage and provision data-centre resources Edge Computing alleviates some of the challenges posed by cloud computing at the cost of introducing some fragmentation in the infrastructure. But how about the Things? In a large class of system we need to manage and provision them too…
  • 30. What’s Really Needed? A scalable, location transparent, data- centric layer that allows us to effectively get the data where needed while minimising resource usage 1
  • 31. What’s Really Needed? A geo-distributed, location transparent, storage infrastructure that allows us to store data where it makes sense to support local computing while maintaining location transparent access to it. 2 Home/Building Management – Edge Computing As we tackle the problem, it would also make sense to address edge computing and ensure that our solution will allow for location transparent and uniform access to data even if that is living on the edge.
  • 32. What’s Really Needed? 3 An infrastructure that allows us to federate compute, storage, I/O and communication resources regardless of their location (Fog Infrastructure)
  • 35. Internet protocol For historical reasons, internet has been built on a host-centric communication model. (machine-to-machine)
  • 36. The Internet today Most of the application on the internet today are data / content centric. What matters to the user is the data not as much who has it…
  • 37. Internet protocol The internet protocol is inherently one-to-one. Broadcast and multicast communications are not viable in wide networks. Thus the diffusion of the same data to multiple consumers is very inefficient.
  • 38. NDN / CCN NDN is based on a data centric networking paradigm. Data samples are identified with hierarchical names. NDN is Inherently Pull and best suited for static data. Named Data Networking Content Centric Networking /com.adlink/fr/employees/olivier.hecart
  • 39. DDS is a great data centric technology which embraces powerful concepts like strong decoupling between publishers and subscribers. But DDS has been designed for small to medium systems and suffers from major scalability issues on larger systems. It is push based which makes uneasy to retrieve specific data or to properly filter data streams. Data Distribution Service
  • 40. The Internet of Tomorrow With the raise of IoT, the different devices connected to the internet use very heterogeneous networking technologies (TCP/IP, BLE, 3G, 6LowPan, …). Some endpoints are extremely constrained w.r.t computational, communication resources as well as energy.
  • 41. Internet scale data-centric protocol that unifies data-sharing between any kind of device including those constrained with respect to the node resources, such as computational resources and power, as well as the network.
  • 42. Conceptual Model zenoh provides a data-centric abstraction in which applications can read and write data autonomously and asynchronously. The data read and written by zenoh applications is associated with one or more resources identified by a URI. DDS Global Data Space ... Data Writer Data Writer Data Writer Data Reader Data Reader Data Reader Data Reader Data Writer R1 R2 R i Rn -- These are Resources /myhouse/floor/1/musicroom/LightStatus /myhouse/floor/2/musicroom/LightStatus /myhouse/floor/2/bedroom/erik/LightStatus -- These are Selections /myhouse/floor/2/bedroom/*/LightStatus /myhouse/**/LightStatus /myhouse/**
  • 43. Conceptual Model Data can be pushed to subscribers and storages and be queried from storages. zenoh pub/sub protocol (push) storage/query protocol (pull) Publisher SubscriberStorage write / stream subscribestore query
  • 44. Conceptual Model Data can be pushed-to, pulled or queried-from applications periodically or asynchronously.
  • 46. Reliability & Ordering Z1 Z2 Z6 Z3 Z5 Z4A1 A2 application-to-application reliability first-to-last-broker Zenoh supports 3 levels of reliability : • Hop to hop reliability. Ensures reliability and ordering when NO failures. • App-to-app reliability. • First-to-last-broker reliability. More scalable than app-to-app reliability.
  • 47. Zenoh clients • Low footprint C client • OCaml client • Python client • Bash client
  • 48. A piece of code Publisher : z = zenoh.connect('127.0.0.1:7447') pub = z.declare_publisher('/demo/hello') pub.write('Hello world'.encode()) Subscriber : z = zenoh.connect('127.0.0.1:7447') z.declare_subscriber(‘/demo/**', lambda rid, data: print('received {}'.format(data.tobytes().decode())))
  • 50. Throughput 0 2500 5000 7500 10000 8 16 32 64 128 256 512 1024 2048 4096 8192 16384 zenoh Cyclone DDS Mbps
  • 52. Key Highlights Extremely Resource Constrained Environments Defined the most wire/power/memory efficient protocol in the market to provide connectivity to extremely constrained targets Support for: - Peer-to-peer and brokered communication - Batched data and deltas - Ordered reliability and fragmentation - Queries zenoh zenoh 6LowPAN 802.15.4 BLE 2G/3G/ LTE Unspecified API App App App … Application TCP UDP IP
  • 53. Key Highlights Protocol implementation for a 8-bit micro-controllers takes 300 Bytes of RAM and has wire-overhead of 4 bytes for data samples 7 6 5 4 3 2 1 0 +-+-+-+-+-+-+-+-+ |R|S|P| SDATA | +---------------+ ~ SN ~ +---------------+ ~ RID | SID ~ +---------------+ ~ PRID ~ +---------------+ ~ [Payload] ~ +---------------+
  • 55. Home/Building Management Imagine that we have a collection of houses in a residence or equivalently buildings on a business park that we would like to monitor and manage. In other terms, we would like to read, write and observe data specic to the house/building. More importantly we would want to do this from anywhere. //residence-1/house-1/kitchen/airquality //residence-1/house-1/alert //residence-1/house-1/utilities/electricity //residence-1/house-1/laundry/washer/schedule //residence-1/house-n/kitchen/airquality //residence-1/house-n/alert //residence-1/house-n/utilities/electricity //residence-1/house-n/laundry/washer/schedule ...
  • 56. Cloud Centric Home/Building Management One solution is to push the data to the Cloud Applications can use the cloud as the place to go and get or set any information concerning our house/buildings. That is a very commont approach... But, is this a solution to the problem, or is it just delaying the problem? //residence-1/house-i/kitchen/airquality //residence-1/house-i/alert //residence-1/house-i/utilities/electricity //residence-1/house-i/laundry/washer/schedule
  • 57. Scaling Out At some point scaling-up won’t be a solution and we will have to scale-out and leverage multiple cloud regions. With multiple cloud regions the unifed view of the system is lost, and we are back to the starting point.
  • 58. Home/Building Management – Edge Computing As we tackle the problem, it would also make sense to address edge computing and ensure that our solution will allow for location transparent and uniform access to data even if that is living on the edge.
  • 60. YAKS provides a distributed service that implements an eventually consistent, scalable, location transparent, high performance, and distributed key/value store with pluggable back-ends and front-end. YAKS is equipped with dynamic discovery and supports extremely well dynamic environments YAKS data is globally accessible without requiring local replication as in traditional key/ value stores.
  • 61. Home/Building Management with YAKS Regardless of wether data is the device, the edge infrastructure or the cloud, YAKS provides location transparent access through a distributed key-value store abstraction. All the details concerning how to get the data from were it is to were it needs to are handled by YAKS.
  • 63. YAKS Architecture YAKS has a modular architecture relying on different kinds of plugins Engine AccessControl Crypto Authetication DBMS … Memory Socket … REST zenoh Security Plugin Backend Plugin Transport Plugin Frontend Plugin GPS Clock Logical C/C++ Go Java JavaScript … API
  • 66. YAKS YAKS is a distributed service to define, manage and operate on key/value spaces The key abstractions at the core of yaks are Path, Value, Selector, Storage, Workspace, and Admin Space
  • 67. YAKS Values A YAKS Value is defined by the following tuple: v = e, c, t Where e is the encoding and c represents the content and t is a logical timestamp used for ordering.
  • 68. YAKS Path A Path in YAKS is a string having the following format: /s1/s2/…/sn Where si does not contain wildcard characters such as ‘*’ and ‘**’ Example: /com/adlink/factory/shanghai/line/1/machine/ /net/icorsaro/home/livingroom/lightbulb/10
  • 69. YAKS Selector A Selector in YAKS is the conjunction of an expression identifying a set of keys and optionally a predicate on values /se1/se2/…/sen [? [predicate] [(properties)]] [#projection] Where: • sei may contain wildcard characters such as ‘*’ and ‘**’ • the predicate has the form: f1 op v1 f2 op v2… fn op vn 
 (where op can be , =, =, =, and !=) • the properties is a semicolon separated list of key=value • the projection is a semicolon separated list of fields to project. Example: /net/icorsaro/home/*/lightbulb?luminosity50#id /net/icorsaro/home/*/consumption/statistics?(start=yesterday;end=now)#average;std
  • 70. Selector / Path matching ‘*’ to match 1 segment (full or partial): Examples: /home/bob/*/light /home/bob/room*/light /home/bob/*/light matches matches doesn’t match /home/bob/kitchen/light /home/bob/room1/light /home/bob/floor1/room2/light Examples: /home/bob/**/light /home/bob/** matches also matches /home/bob/kitchen/light /home/bob/floor1/room2/light /home/bob/floor2/room1/temp ‘**’ to match several segments (full):
  • 71. YAKS Storage A Storage in YAKS is defined by means of a selector s and backend B. Where the back-end B may be one of supported backends, such as main-memory, DBMS, etc. A Storage with selector s will store path,value for which s matches the path.
  • 72. KV Space Operations YAKS primitives to operate on the key/value space are: • put, update, remove, get • subscribe/unsubscribe • register_eval/unregister_eval, eval
  • 73. Put/Get put Data are published via put/update. Matching storages receive and store the data. Later on, applications can query the data
  • 74. Put/Get get Data are published via put/update. Matching storages receive and store the data. Later on, applications can query the data get
  • 75. Subscriptions subscribe put subscribe Data are published via put/update. Yaks routes the publications to all matching subscribers.
  • 76. Evals register_eval eval Any application can bind a computation with a path. Applications can trigger the execution of these functions by evaluating the path.
  • 77. Key Primitives class Workspace(object): def put(self, path, value) def update(self, path, value) def remove(self, path) def get(self, selector) def subscribe(self, selector, listener) def unsubscribe(self, subscription_id) def register_eval(self, path, callback) def unregister_eval(self, path) def eval(self, selector)
  • 78. Play with it…. us-west.yaks.is
 /demo/uswc/** us-east.yaks.is
 /demo/us-east/** eu-central.yaks.is
 /demo/eu/** ap-southeast.yaks.is /demo/ap/** Example: • Put data: curl -X PUT -d 'Hello World!' http://us-west.yaks.is:8000/demo/eu/test • Get data: curl http://ap-southeast.yaks.is:8000/demo/*/test
  • 80. Vision fogOS aims at providing a decentralised infrastructure for provisioning and managing (1) compute, (2) storage, (3) communication and (3) I/O resources available anywhere across the network. fogOS addresses highly heterogeneous systems even those with extremely resource-constrained nodes.
  • 81. — Decentralised Design fogOS can manage and provision any network connected device on which it agent is running Its decentralised architecture allows to manage the system from anywhere and does not need any specific set of nodes running as “servers”
  • 83. Modules Fog Infrastructure Manager Virtualises the hardware infrastructure, such as computational, communication, storage and I/O resources, and abstract the key primitives provided by system software, such as the OS Provides primitives for managing these virtualised infrastructure Provides infrastructure level monitoring information. Fog Atomic Entity Manager (FAEM) Fog Entity Orchestrator Fog Infrastructure Manager (FIM)
  • 84. Modules Fog Atomic Entity Manager Manages the Fog Atomic Entity (FAE) life-cycle and maps then into FDU to be deployed by the FIM. Triggers the FAE specific monitoring plug-ins in response to relevant events such as migration, failure, etc. This information may be used by the Fog Entity Orchestrator (FEO) to trigger re-allocation, restart, etc. 
 The main abstraction provided by the FAEM is the Fog Atomic Entity Fog Atomic Entity Manager (FAEM) Fog Entity Orchestrator Fog Infrastructure Manager (FIM)
  • 85. Modules Fog Entity Orchestrator Validates the entity specification Decides based on available resources and entity constraints if it can be accepted. Device an allocation of the entity that optimises resource utilisation while satisfying the entity’s functional and non-functional requirements Executes the allocation by proper coordination with the FAEM and FIM Continuously monitors and reconfigures entity allocation to ensure that the constraints are satisfied. Fog Atomic Entity Manager (FAEM) Fog Entity Orchestrator Fog Infrastructure Manager (FIM)
  • 86. Entity An entity fragment is directed acyclic graph of atomic entities. 
 An entity is a directed acyclic graph of atomic entities and entity fragments. 
 VM C UK C BE UK VM: Virtual Machine C: Container UK: Uni Kernel BE: Binary Executable uS: micro Service uS BE UKUK
  • 87. AT() Information Model fogOS’s information model defines the describes associated with nodes, entities and networks. Additionally it provides an abstract way to describe applications and relations between them. It is implemented as a set of YANG Models.
  • 88. AT() Relation with ETSI NFV and MEC IM fogOS information model is a super-set of the ETSI (European Telecommunications Standards Institute) MEC and ETSI NFV Specifically, fogOS supports the declaration of I/O constraints. YANG models have also been defined for fogOS abstractions.
  • 89. Architecture fogOS is composed by: NDN. At its lowest level, it leverages a Named Data Network (NDN) infrastructure based on zenoh. DDS can also be used as a transport — not necessarily an NDN YAKS. A distributed key-value store that leverages the NDN for scalability Agent. The core logic of fogOS, it takes care of managing, monitoring and orchestrating entities through plugins Plugins. Plugins provide supports for atomic entities, OS, networks, etc. zenoh YAKS AgentPlugins Network Data Link Physical Transport
  • 90. AT() Plugins fog 5 leverages plugins interact and manage: Atomic Entities (Runtimes) Networks OSes Monitoring Resource Orchestration Resource Management For each type of plugin an interface has been defined. For instance, plugins that manage atomic entities have to implement the FSM for the kind of atomic entity they will be managing. zenoh YAKS AgentPlugins Network Data Link Physical Transport
  • 91. Local/Global and Actual/Desired fogOS uses YAKS to maintain the actual and desired state for global and node-specific information This separation ensures that there is never write concurrency on the actual state and that the evolution is entirely under the control of the agent Desired Global Store Actual Global Store Actual node-local Store Desired node-local Store AgentWorld Actual node-local Constraint Store Desired node-local Constraint Store Plug-in 1 Plug-in 2 Plug-in N Normal Node MCU MCU MCU Desired Global Store Actual Global Store Actual node-local Store Desired node-local Store Agent Plug-insWorld
  • 92. AT() Interact with fogOS To interact with fogOS we provide a set of API for Python3. These API uses interact with fogOS using the distributed data store. The demo that we show uses this API. API Docs: https://atolab.github.io/fog05- doc/fog05.html#module-fog05.api
  • 93. — The Eclipse Project Since June 2018
  • 94. OpenFog and 5GPPP fogOS is one of the infrastructure identified as compliant with the 5G principles and requirements by the EU 5GPPP working group fogOS architecture is compatible with the OpenFog Reference Architecture. Additionally fogOS is used as the reference fog platform in several test-beds
  • 95. Users and Press Mm2 Multi-access edge platform manager - NFV (MEPM-V) MEAO fog05 + MEPM-V plugin 5GCity Components ETSI NFV Components ETSI MEC Components Multilayer Orchestrator Operation Support System Os-Ma-nfvo NFVO VNFM (ME app LCM) VNFM (ME platform LCM) Virtualisation Infrastructure Manager Multi-access edge platform (VNF) NFVI Data plane (VFN/PNF) Os-Ma-nfvo Me app (VNF) Service Mm5 Mp1 Mp2 Or-Vnfm Or-Vi Ve-Vnfm-vnf Nf-Vi Nf-Vn Nf-Vn Ve-Vnfm-em Vi-Vnfm = Mm6 Mv3 Mv2 Mv1 ETSI NFV Reference points ETSI MEC Reference points ETSI NFV-MEC Reference points • Mv1 ~ Os-Ma-nfvo • Mv2 ~ Ve-Vnfm-em • Mv3 ~ Ve-Vnfm-vnf Mm3* Mm1 fog05 + MEAO plugin
  • 97. Key Takeaways Cloud Computing is operationally convenient but it has several limitations that limit its applicability in a large class of applications. 1
  • 98. Key Takeaways The Edge is fuzzy in essence and limiting by nature. We should focus on infrastructure that allows to unify the computational, communication, communication and I/O resources end-to-end 2
  • 99. Key Takeaways The world outside of the data-center is constrained, heterogeneous, and tricky. Yet, that’s the place where the difference can be made. 3