This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Angelo	Corsaro,	PhD	
Chief	Technology	Officer	
ADLINK	Technologies	Inc.	
angelo.corsaro@adlinktech.com
Fog Computing
Defined
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
State of Practice
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The majority of IoT systems
are today cloud-centric
These systems are
characterised by device-to-
cloud communication and
in-cloud analytics
Cloud-Centric
Architectures
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Why do we need
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
Too many Devices
The number of IoT devices is
expected to grow
exponentially
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial IoT applications such
as Smart Grids , Smart
Factories, Smart Farming,
Connected Vehicles and Smart
Cities are not compatible with
the assumptions of Cloud
Centric Architectures
Industrial IoT
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
There is sufficient
bandwidth to push data to
the Cloud.
Cloud-Centric
Architectures
Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory
0.5 TB of data
produced per day
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Connectivity is not an
issue. A device will (almost)
always be connected to the
cloud.
Cloud-Centric
Architectures
Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous
Vehicles
coordination of fast moving
autonomous vehicles
intermittent
connectivity
dynamic pairing of devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The latency induced by
cloud-centralised analytics
and control is compatible
with the dynamic of the IoT
system
Cloud-Centric
Architectures
Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Latency
Constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The connectivity cost is
negligible
Cloud-Centric
Architectures
Assumption #4
Cost of connectivity is an
issue in Smart Grids as the
operator has to pay for the
2G/3G/4G data-link
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial companies are
comfortable in exposing
their data to the cloud.
Cloud-Centric
Architectures
Assumption #5
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
What is
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but
closer to the “Things”
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that
distributes computing, storage, control and
networking functions closer to the users
along a cloud-to-thing continuum
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog is about reactive cyber-physical applications
Fog is about interacting with the physical world
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Cloud technologies are not always
applicable on the edge because of
performance and resource constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
A new infrastructure has to be "invented"
for the edge, innovating when necessary
and reusing when possible
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Real-Time Performance and
Reliability
Location- and Resource-
Aware deployment
Resource and Device
Virtualisation
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Resource aware provisioning
of applications and tenants
Tamper Proof Security (in
some deployments it is easier
to get physical access to the
fog platform)
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
[source: OpenFog Whitepaper http://bit.ly/openfog-wp]
Open Fog
The recently established
OpenFog is accelerating
and facilitating the
expansion, convergence
and interoperability of
Fog computing stacks
Consortium
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Open Fog Reference Architecture
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Has it been proven?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Barcelona
Smart City Platform
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MEC
MEC is a network architecture concept that enables
Integrated networking, computing and storage
resources into one programmable and unified edge
infrastructure.
Mobile/Multi-access Edge Computing (MEC)
The basic idea behind
MEC is that by running
applications and
performing related
processing tasks
closer to the cellular
customer, network
congestion is reduced
and applications
perform better.
MEC
Fog vs. MEC
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core
The MEC infrastructure resides at the edge of the operator
infrastructure.
The operator own and manages the infrastructure but not the
“things”
MEC Boundaries
User Terminal, Things, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The Fog infrastructure resides on premises and at the edge of
end-system infrastructure.
The fog infrastructure as well as the “things” are often owned and
managed by the same authority, i.e. smart factory, smart grid, etc.
FOG Boundaries
Fog
External
Network
Things, Machines, User
Terminal, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core Fog
Things, Machines, User
Terminal, …
The Fog and MEC infrastructure exist within different
administrative boundaries
The ability of leveraging Fog, on premises, and MEC at the edge
of the network, will be the ideal situation for demanding IIoT
applications
FOG / MEC Boundaries
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
5G and MEC focus on Real-Fast
Beside the real-fast Fog has to
support Real-Time
Real-Time and Real-Fast are
not the same!
Real-Fast vs. Real-Time
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
0
1
2
3
4
5
Latency
Throughput
R
eal-Tim
e
M
ulti-Tenancy
Security
H
igh
AvailabilityM
anageabilityH
etherogeneity
MEC
FOG
From an high level perspective
MEC and Fog computing aim
at virtualising compute,
storage and networking at the
edge
Yet, their requirements differ
significantly in some areas as
Fog computing deals with OT
systems
MEC / Fog
Needs
Summing UP
MEC and Fog Computing aims at the same high level goal, which is
providing a virtualised compute, storage and communication fabric
Yet they have unique requirements stemming from the target
application domain
Platform that wish to address and unify MEC and Fog computing
need to exploit similarities but more importantly address the
differences
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary

Fog Computing Defined

  • 1.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Angelo Corsaro, PhD Chief Technology Officer ADLINK Technologies Inc. angelo.corsaro@adlinktech.com Fog Computing Defined
  • 2.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary State of Practice
  • 3.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The majority of IoT systems are today cloud-centric These systems are characterised by device-to- cloud communication and in-cloud analytics Cloud-Centric Architectures
  • 4.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Why do we need Fog Computing?
  • 5.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary *IDC *CISCO Too many Devices The number of IoT devices is expected to grow exponentially
  • 6.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial IoT applications such as Smart Grids , Smart Factories, Smart Farming, Connected Vehicles and Smart Cities are not compatible with the assumptions of Cloud Centric Architectures Industrial IoT
  • 7.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary There is sufficient bandwidth to push data to the Cloud. Cloud-Centric Architectures Assumption #1
  • 8.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Smart Factory 0.5 TB of data produced per day
  • 9.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Connectivity is not an issue. A device will (almost) always be connected to the cloud. Cloud-Centric Architectures Assumption #2
  • 10.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Autonomous Vehicles coordination of fast moving autonomous vehicles intermittent connectivity dynamic pairing of devices
  • 11.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The latency induced by cloud-centralised analytics and control is compatible with the dynamic of the IoT system Cloud-Centric Architectures Assumption #3
  • 12.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 13.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 14.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Latency Constraints
  • 15.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The connectivity cost is negligible Cloud-Centric Architectures Assumption #4
  • 16.
    Cost of connectivityis an issue in Smart Grids as the operator has to pay for the 2G/3G/4G data-link
  • 17.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial companies are comfortable in exposing their data to the cloud. Cloud-Centric Architectures Assumption #5
  • 19.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary What is Fog Computing?
  • 20.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but closer to the “Things” Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 21.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 22.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog is about reactive cyber-physical applications Fog is about interacting with the physical world
  • 23.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Cloud technologies are not always applicable on the edge because of performance and resource constraints
  • 24.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary A new infrastructure has to be "invented" for the edge, innovating when necessary and reusing when possible
  • 25.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Real-Time Performance and Reliability Location- and Resource- Aware deployment Resource and Device Virtualisation Fog Computing traits
  • 26.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Resource aware provisioning of applications and tenants Tamper Proof Security (in some deployments it is easier to get physical access to the fog platform) Fog Computing traits
  • 27.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary [source: OpenFog Whitepaper http://bit.ly/openfog-wp] Open Fog The recently established OpenFog is accelerating and facilitating the expansion, convergence and interoperability of Fog computing stacks Consortium
  • 28.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Open Fog Reference Architecture
  • 29.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Has it been proven?
  • 30.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Barcelona Smart City Platform
  • 31.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 32.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 33.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 34.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MEC
  • 35.
    MEC is anetwork architecture concept that enables Integrated networking, computing and storage resources into one programmable and unified edge infrastructure. Mobile/Multi-access Edge Computing (MEC)
  • 36.
    The basic ideabehind MEC is that by running applications and performing related processing tasks closer to the cellular customer, network congestion is reduced and applications perform better. MEC
  • 37.
  • 38.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MECNet-Core The MEC infrastructure resides at the edge of the operator infrastructure. The operator own and manages the infrastructure but not the “things” MEC Boundaries User Terminal, Things, …
  • 39.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The Fog infrastructure resides on premises and at the edge of end-system infrastructure. The fog infrastructure as well as the “things” are often owned and managed by the same authority, i.e. smart factory, smart grid, etc. FOG Boundaries Fog External Network Things, Machines, User Terminal, …
  • 40.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MECNet-Core Fog Things, Machines, User Terminal, … The Fog and MEC infrastructure exist within different administrative boundaries The ability of leveraging Fog, on premises, and MEC at the edge of the network, will be the ideal situation for demanding IIoT applications FOG / MEC Boundaries
  • 41.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 5G and MEC focus on Real-Fast Beside the real-fast Fog has to support Real-Time Real-Time and Real-Fast are not the same! Real-Fast vs. Real-Time
  • 42.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 0 1 2 3 4 5 Latency Throughput R eal-Tim e M ulti-Tenancy Security H igh AvailabilityM anageabilityH etherogeneity MEC FOG From an high level perspective MEC and Fog computing aim at virtualising compute, storage and networking at the edge Yet, their requirements differ significantly in some areas as Fog computing deals with OT systems MEC / Fog Needs
  • 43.
    Summing UP MEC andFog Computing aims at the same high level goal, which is providing a virtualised compute, storage and communication fabric Yet they have unique requirements stemming from the target application domain Platform that wish to address and unify MEC and Fog computing need to exploit similarities but more importantly address the differences
  • 44.
    This slides havebeen crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary