SlideShare a Scribd company logo
FIWARE at the edge:
FogFlow, a new GE for IoT edge computing
Bin Cheng (bin.cheng@neclab.eu),
Ernö Kovacs (ernoe.kovacs@neclab.eu)
NEC Labs Europe
Background: edge computing
 Cloud computing
• Centralized, elastic and powerful resources, good transparency
 Internet of things
• Contextual data are constantly generated and to be used at edges
• Many IoT services required the closed loop of sensing, analyzing, decision-making, and
reacting; fast response time; automated workload management
• Cloud-only based architecture is not enough to meet service requirements for IoT, due to
inefficient bandwidth consumption, latency limit, privacy concerns
 New trend: IoT edge computing
• Outsourcing more processing close to data
• Utilize both cloud computing and edge computing in a transparent manner
• Low latency, reduced bandwidth consumption, better privacy preserving
Motivation
2
edge computing has great potential to reduce bandwidth consumption and end-to-end
latency, but it raises much more complexity than cloud computing since the cloud-edge
environment is more open, heterogeneous, and dynamic
Can we program applications over
cloud-edges easily, like
programming them in the cloud?
Can we let the cloud-edge platform to
automatically manage and optimize its
own resources under such dynamics?
Complicate to realize services due to lack
of programming model and poor
interoperability:
spend months for each service
service/application
providers
No approach of dealing with dynamics like
device mobility, instant service usage,
temporary failure:
applications have to face those issues
service realization
during the development phase
resource management
during the deployment phase
new
services
New requirements
come frequently
What Is FogFlow (1): Cloud-Edge Orchestrator
 FogFlow is a cloud-edge orchestrator to orchestrate dynamic NGSI-based data
processing flows on-demand between producers and consumers for providing timely
results to make fast actions, based on context (system context and data context)
Producers
(sensors)
Consumers
(actuators)
cloud
edge edge edge
raw context information
timely results fast actions
FogFlow dynamic
processing
flows
Data context
System context
What Is FogFlow (2): High Level View
4
Benefits from FogFlow
 For IoT service developers
• Fast time to market, less development effort
 For IoT service operators
• Easy management with fast deployment and upgrade
 For platform providers
• Efficient usage of infrastructure resources
• Low operation cost (reduced bandwidth consumption)
 For service users (devices or application users)
• Better QoS (low latency, fast response time)
5
Key Feature: Context Aware Cloud-Edge Orchestration
6
Data Context and
availability
(metadata, availability)
System Context
(locality, mobility, capacity,
security, …)
Programming model
with graphical editor
Relation with Other GEs
7
Distributed Context
Management System
OrionProcessing
tasks
FogFlow subscription
APPS
Other
GE(s)
sensors actuators
FogFlow
Dashboard
notify
e.g. Cygnus
non-NGSI
devices
Adapter(s)
(e.g., openMTC, IoT
Agent)
Current Status
 Version 1.0 is released as open source at Github, under BSD-4 license
• https://github.com/smartfog/fogflow,
 Approved as FIWARE GE
 Detailed tutorial is available, with examples
• http://fogflow.readthedocs.io
 Being used in both EU projects and internal NEC use cases
• SMARTIE for “smart building” use case
• CPaaS.io for “smart parking” use case
• Internal use cases: anomaly detection, lost child finding
 Technical paper published at IEEE Internet of Things Journal with open access
 Demonstrations at iEXPO in Tokyo & Smart City Expo World Congress in Barcelona
8
Roadmap
 Take further actions to
• More use case examples
• Webinar
• Necessary documents as FIWARE GE
• Support quality test
 Develop new features
• Security enhanced processing flows
• Mobility aware task migration
• Autonomous management
 Apply FogFlow for the FIWARE implementation of Industrial Data Space
9
10
How to Use FogFlow
http://fogflow.readthedocs.io/
System Deployment
11
FogFlow Dashboard
12
Development Process
13
Use Case Example
14
Designing a IoT Service
15
Developing Dockerized Operators
16
Defining Your Service Topology
17
Triggering Your IoT Service
18
Service Topology
Execution Plan
Deployment Plan
cloud
edge1edge2
 Expected output
 Scope
 scheduler
locality aware deployment
dynamic execution graph
Orchestration requirement
Using The Results Generated from Your IoT Service
19
Consumer
(Alarm2)
Consumer
(City Operation
Center)
Consumer
(Alarm1)
subscribe
notify
subscribe
notify
Broker (edge)
Broker (cloud)
Broker (edge)
FogFlow Context Management System
IoT Discovery
subscribe
References
20
FogFlow paper published by IoT-J
Online tutorial:
http://fogflow.readthedocs.ioB. Cheng, G. Solmaz, F. Cirillo, E. Kovacs, K. Terasawa and A. Kitazawa,
“FogFlow: Easy Programming of IoT Services Over Cloud and Edges for
Smart Cities,” in IEEE Internet of Things Journal
Acknowledgement
 This work has been partially funded by the European Union’s Horizon 2020 research
and innovation programme within the CPaaS.io project under Grant Agreement No.
723076
21
Thank you!
http://fiware.org
Follow @FIWARE on Twitter

More Related Content

What's hot

IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
Maria Gorlatova
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Jiang Zhu
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
Fastly
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
Iván Alfonso
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
Nitinder Mohan
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
Centric
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform
霈萱 蔡
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
Abdul Qadir
 
Review of Cloud Computing Simulation Platforms and Related Environments
Review of Cloud Computing Simulation Platforms and Related EnvironmentsReview of Cloud Computing Simulation Platforms and Related Environments
Review of Cloud Computing Simulation Platforms and Related Environments
RECAP Project
 
Fog computing
Fog computingFog computing
Fog computing
Abdul Qadir
 
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
Joseph Kuo
 
How Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the InternetHow Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the Internet
Gilles Fedak
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
aedifion's E-World presentation
aedifion's E-World presentationaedifion's E-World presentation
aedifion's E-World presentation
Johannes Fütterer
 
Grid computing
Grid computingGrid computing
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the Industry
William Liang
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
Shuquan Huang
 

What's hot (20)

IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
Cloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, CentricCloud and grid computing by Leen Blom, Centric
Cloud and grid computing by Leen Blom, Centric
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
 
Review of Cloud Computing Simulation Platforms and Related Environments
Review of Cloud Computing Simulation Platforms and Related EnvironmentsReview of Cloud Computing Simulation Platforms and Related Environments
Review of Cloud Computing Simulation Platforms and Related Environments
 
Fog computing
Fog computingFog computing
Fog computing
 
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
 
How Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the InternetHow Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the Internet
 
Fog computing
Fog computingFog computing
Fog computing
 
aedifion's E-World presentation
aedifion's E-World presentationaedifion's E-World presentation
aedifion's E-World presentation
 
Grid computing
Grid computingGrid computing
Grid computing
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the Industry
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 

Similar to FogFlow: Cloud-Edge Orchestrator in FIWARE

FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge ProgrammingFIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
Stephan Haller
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
Krishna-Kumar
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the network
Megan O'Keefe
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Radisys Corporation
 
Networking Challenges for the Next Decade
Networking Challenges for the Next DecadeNetworking Challenges for the Next Decade
Networking Challenges for the Next Decade
Open Networking Summit
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.
sindhuRashmi1
 
Akraino and Edge Computing
Akraino and Edge ComputingAkraino and Edge Computing
Akraino and Edge Computing
Liz Warner
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challenges
Frederic Desprez
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
The evolution of data center network fabrics
The evolution of data center network fabricsThe evolution of data center network fabrics
The evolution of data center network fabrics
Cisco Canada
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applications
Sabelo Dlamini
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of Things
HarshitParkar6677
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
Daniel Krook
 

Similar to FogFlow: Cloud-Edge Orchestrator in FIWARE (20)

FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge ProgrammingFIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
FIWARE Global Summit - FogFlow GE: Intent-based Edge Programming
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the network
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
 
Networking Challenges for the Next Decade
Networking Challenges for the Next DecadeNetworking Challenges for the Next Decade
Networking Challenges for the Next Decade
 
Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.Foog computing and iFogSim for sustainable smart city.
Foog computing and iFogSim for sustainable smart city.
 
Akraino and Edge Computing
Akraino and Edge ComputingAkraino and Edge Computing
Akraino and Edge Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challenges
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
The evolution of data center network fabrics
The evolution of data center network fabricsThe evolution of data center network fabrics
The evolution of data center network fabrics
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applications
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of Things
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
Cloud Native Architectures with an Open Source, Event Driven, Serverless Plat...
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

FogFlow: Cloud-Edge Orchestrator in FIWARE

  • 1. FIWARE at the edge: FogFlow, a new GE for IoT edge computing Bin Cheng (bin.cheng@neclab.eu), Ernö Kovacs (ernoe.kovacs@neclab.eu) NEC Labs Europe
  • 2. Background: edge computing  Cloud computing • Centralized, elastic and powerful resources, good transparency  Internet of things • Contextual data are constantly generated and to be used at edges • Many IoT services required the closed loop of sensing, analyzing, decision-making, and reacting; fast response time; automated workload management • Cloud-only based architecture is not enough to meet service requirements for IoT, due to inefficient bandwidth consumption, latency limit, privacy concerns  New trend: IoT edge computing • Outsourcing more processing close to data • Utilize both cloud computing and edge computing in a transparent manner • Low latency, reduced bandwidth consumption, better privacy preserving
  • 3. Motivation 2 edge computing has great potential to reduce bandwidth consumption and end-to-end latency, but it raises much more complexity than cloud computing since the cloud-edge environment is more open, heterogeneous, and dynamic Can we program applications over cloud-edges easily, like programming them in the cloud? Can we let the cloud-edge platform to automatically manage and optimize its own resources under such dynamics? Complicate to realize services due to lack of programming model and poor interoperability: spend months for each service service/application providers No approach of dealing with dynamics like device mobility, instant service usage, temporary failure: applications have to face those issues service realization during the development phase resource management during the deployment phase new services New requirements come frequently
  • 4. What Is FogFlow (1): Cloud-Edge Orchestrator  FogFlow is a cloud-edge orchestrator to orchestrate dynamic NGSI-based data processing flows on-demand between producers and consumers for providing timely results to make fast actions, based on context (system context and data context) Producers (sensors) Consumers (actuators) cloud edge edge edge raw context information timely results fast actions FogFlow dynamic processing flows Data context System context
  • 5. What Is FogFlow (2): High Level View 4
  • 6. Benefits from FogFlow  For IoT service developers • Fast time to market, less development effort  For IoT service operators • Easy management with fast deployment and upgrade  For platform providers • Efficient usage of infrastructure resources • Low operation cost (reduced bandwidth consumption)  For service users (devices or application users) • Better QoS (low latency, fast response time) 5
  • 7. Key Feature: Context Aware Cloud-Edge Orchestration 6 Data Context and availability (metadata, availability) System Context (locality, mobility, capacity, security, …) Programming model with graphical editor
  • 8. Relation with Other GEs 7 Distributed Context Management System OrionProcessing tasks FogFlow subscription APPS Other GE(s) sensors actuators FogFlow Dashboard notify e.g. Cygnus non-NGSI devices Adapter(s) (e.g., openMTC, IoT Agent)
  • 9. Current Status  Version 1.0 is released as open source at Github, under BSD-4 license • https://github.com/smartfog/fogflow,  Approved as FIWARE GE  Detailed tutorial is available, with examples • http://fogflow.readthedocs.io  Being used in both EU projects and internal NEC use cases • SMARTIE for “smart building” use case • CPaaS.io for “smart parking” use case • Internal use cases: anomaly detection, lost child finding  Technical paper published at IEEE Internet of Things Journal with open access  Demonstrations at iEXPO in Tokyo & Smart City Expo World Congress in Barcelona 8
  • 10. Roadmap  Take further actions to • More use case examples • Webinar • Necessary documents as FIWARE GE • Support quality test  Develop new features • Security enhanced processing flows • Mobility aware task migration • Autonomous management  Apply FogFlow for the FIWARE implementation of Industrial Data Space 9
  • 11. 10 How to Use FogFlow http://fogflow.readthedocs.io/
  • 16. Designing a IoT Service 15
  • 18. Defining Your Service Topology 17
  • 19. Triggering Your IoT Service 18 Service Topology Execution Plan Deployment Plan cloud edge1edge2  Expected output  Scope  scheduler locality aware deployment dynamic execution graph Orchestration requirement
  • 20. Using The Results Generated from Your IoT Service 19 Consumer (Alarm2) Consumer (City Operation Center) Consumer (Alarm1) subscribe notify subscribe notify Broker (edge) Broker (cloud) Broker (edge) FogFlow Context Management System IoT Discovery subscribe
  • 21. References 20 FogFlow paper published by IoT-J Online tutorial: http://fogflow.readthedocs.ioB. Cheng, G. Solmaz, F. Cirillo, E. Kovacs, K. Terasawa and A. Kitazawa, “FogFlow: Easy Programming of IoT Services Over Cloud and Edges for Smart Cities,” in IEEE Internet of Things Journal
  • 22. Acknowledgement  This work has been partially funded by the European Union’s Horizon 2020 research and innovation programme within the CPaaS.io project under Grant Agreement No. 723076 21