SlideShare a Scribd company logo
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Angelo Corsaro, PhD
Chief Technology Officer
angelo.corsaro@prismtech.com
Fog Computing
with VORTEX
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Why do we need
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The majority of IoT systems
are today cloud-centric
These systems are
characterised by device-to-
cloud communication and
in-cloud analytics
Cloud-Centric
Architectures
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
The number of IoT devices is
expected to grow
exponentially
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCOCISCO estimates an average
of 6.6 devices per person
leading to 50B devices in
2020.
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
IDC estimates 27.9 devices
per person leading to 212B
Too many Devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial IoT applications such
as Smart Grids , Smart
Factories, Smart Farming,
Connected Vehicles and Smart
Cities are not compatible with
the assumptions of Cloud
Centric Architectures
Industrial IoT
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
There is sufficient
bandwidth to push data to
the Cloud.
Cloud-Centric
Architectures
Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory
0.5 TB of data
produced per day
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Connectivity is not an
issue. A device will (almost)
always be connected to the
cloud.
Cloud-Centric
Architectures
Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous
Vehicles
coordination of fast moving
autonomous vehicles
intermittent
connectivity
dynamic pairing of devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The latency induced by
cloud-centralised analytics
and control is compatible
with the dynamic of the IoT
system
Cloud-Centric
Architectures
Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Latency
Constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The connectivity cost is
negligible
Cloud-Centric
Architectures
Assumption #4
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial companies are
comfortable in exposing
their data to the cloud.
Cloud-Centric
Architectures
Assumption #5
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
What is
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but
closer to the “Things”
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryelastic and high-performance computing,
storage and communication at the edge
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog is about reactive cyber-physical applications
Fog is about interacting with the physical world
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Cloud technologies are not always
applicable on the edge because of
performance and resource constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
A new infrastructure has to be "invented"
for the edge, innovating when necessary
and reusing when possible
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Real-Time Performance and
Reliability
Location- and Resource-
Aware deployment
Resource and Device
Virtualisation
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Resource aware provisioning
of applications and tenants
Tamper Proof Security (in
some deployments it is easier
to get physical access to the
fog platform)
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Has it been proven?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing
with Vortex
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex is a standard technology for
efficient, ubiquitous, interoperable,
secure and platform independent data
sharing across network connected
devices
in151
Characters
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing
Vortex naturally fits with the fog
computing paradigm and is the only
fog-ready data-sharing infrastructure
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex lets data flow where
needed transparently while
optimising the data sharing
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Location
Transparency
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Whenever possible data is
shared using Device-to-
Device communication
Location
Transparency
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
When necessary data
sharing is mediated by
Vortex Infrastructure, i.e.,
Vortex Fog and Cloud
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Location
Transparency
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
location
transparency
Cloud Computing
Fog Computing
Device-to-Cloud
Communication
Device-to-Device
Communication
Fog-to-Cloud
Communication
Cloud-to-Cloud
Communication
Device-to-Device
Communication
Collect | Store | Analyse | Share
Collect | Store | Analyse | Share
Fog Computing
Fog Computing
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Performance
Vortex delivers low and
deterministic latency as
well as very high throughput
30 μs peer-to-peer latency
4+ Mmsgs/sec p2p
throughput
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Native Integration with the
hottest real-time analytics
platforms and CEP
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Security
Data-Level security with
Pluggable Authentication
Access Control and Crypto
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
Deployment
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex device, such as Lite, Café,
and Web are used to share data
between different kinds of
applications within a car
Café and Web are typically used
Android / HTML5 based
infotainment
Lite in typically used in ECU,
sensors and onboard analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog is used to
transparently (for in car apps)
decouple and control the data
sharing within and across the
car
Vortex Fog also helps defining
security boundaries and
policies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and
securely deals with car to car
communication
Vortex Fog allows to
decouple the transport used
for in-car communication
and that used for car-to-car
communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and
securely deals with cloud
connectivity adapting traffic
flows and protocols
Device-to-Cloud
Communication
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Cloud efficiently
and securely makes data
available to any device at
an Internet Scale
Device-to-Cloud
Communication
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing will underpin the largest
majority of IoT systems
Fog Computing Platforms are starting to
emerge in the market
Vortex is the only Data-Sharing
Technology that is Fog-Ready
In
Summary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing
Blog
http://bit.ly/fogblog-part-i
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary

More Related Content

PDF
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
PDF
Vortex 2.0 -- The Industrial Internet of Things Platform
PDF
Fluid IoT Architectures
PDF
Fog Computing Defined
PDF
fog05: The Fog Computing Infrastructure
PDF
Fog Computing - DEV.BG 2018
PDF
fog05: The Fog Computing Platform
PPTX
fog computing ppt
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Vortex 2.0 -- The Industrial Internet of Things Platform
Fluid IoT Architectures
Fog Computing Defined
fog05: The Fog Computing Infrastructure
Fog Computing - DEV.BG 2018
fog05: The Fog Computing Platform
fog computing ppt

What's hot (20)

PPTX
Fog computing technology
PPTX
FOG COMPUTING- Presentation
PDF
Fog computing
PPTX
Fog Computing
PPTX
Fog computing
PDF
Fog Computing with VORTEX
PDF
DDS in Action -- Part I
PDF
Latest Thesis Topics for Fog computing
PPTX
Fog Computing
PDF
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
DOCX
Fog computing document
PPTX
Fog computing ( foggy cloud)
PPT
Fog computing provide security to data in cloud ppt
PDF
Security Issues of IoT with Fog
PPTX
Seminar ppt fog comp
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
PPTX
Fog computing 000
PPTX
Fog computing paper presentation
PDF
Fog Computing Platform
PPTX
Fog computing : The new age Technology
Fog computing technology
FOG COMPUTING- Presentation
Fog computing
Fog Computing
Fog computing
Fog Computing with VORTEX
DDS in Action -- Part I
Latest Thesis Topics for Fog computing
Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Fog computing document
Fog computing ( foggy cloud)
Fog computing provide security to data in cloud ppt
Security Issues of IoT with Fog
Seminar ppt fog comp
A Study on Cloud and Fog Computing Security Issues and Solutions
Fog computing 000
Fog computing paper presentation
Fog Computing Platform
Fog computing : The new age Technology
Ad

Viewers also liked (20)

PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
PDF
DDS and OPC UA Explained
PPTX
Fog computing
PDF
Getting Started with Vortex
PDF
DDS In Action Part II
PDF
Microservices Architecture with Vortex — Part II
PDF
Micro services Architecture with Vortex -- Part I
PPTX
FOG COMPUTING
PPTX
Why IoT needs Fog Computing ?
PDF
Distributed Algorithms with DDS
PDF
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
PDF
The Data Distribution Service Tutorial
PDF
IoT Protocols Integration with Vortex Gateway
PDF
DDS Tutorial -- Part I
PDF
Connected Mobile and Web Applications with Vortex
PDF
The Data Distribution Service: The Communication Middleware Fabric for Scala...
PDF
Smart, Secure and Efficient Data Sharing in IoT
PDF
OpenSplice Security Module
PDF
Many Bundles of Things - M Rulli
PDF
Fineo Technical Overview - NextSQL for IoT
Building IoT Applications with Vortex and the Intel Edison Starter Kit
DDS and OPC UA Explained
Fog computing
Getting Started with Vortex
DDS In Action Part II
Microservices Architecture with Vortex — Part II
Micro services Architecture with Vortex -- Part I
FOG COMPUTING
Why IoT needs Fog Computing ?
Distributed Algorithms with DDS
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
The Data Distribution Service Tutorial
IoT Protocols Integration with Vortex Gateway
DDS Tutorial -- Part I
Connected Mobile and Web Applications with Vortex
The Data Distribution Service: The Communication Middleware Fabric for Scala...
Smart, Secure and Efficient Data Sharing in IoT
OpenSplice Security Module
Many Bundles of Things - M Rulli
Fineo Technical Overview - NextSQL for IoT
Ad

Similar to Fog Computing with Vortex (20)

PPT
Digital spectacle by using cloud computing
PDF
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
PDF
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
PDF
Phil Bracikowski [InfluxData] | InfluxDB Cloud Durability Walkthrough | Influ...
PPTX
3 Pitfalls Everyone Should Avoid with Cloud Data
PDF
VLSI Design for Video Coding 2010th Edition Youn
PPTX
Cloud Computing
PPTX
Top 6 Practices to Harden Docker Images to Enhance Security
PDF
Getting Started with Point Clouds Visualisation and AR/VR
PDF
Edge computing in practice using IoT, Tensorflow and Google Cloud
PDF
Practical Cloud Native Security With Falco Risk And Threat Detection For Cont...
PDF
Interoperability in forge - fossa2010
PPTX
3 Pitfalls Everyone Should Avoid with Cloud Data
PDF
Chaos Engineering: Injecting Failure for Building Resilience in Systems
PDF
From printed circuit boards to exploits
PPT
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
PPTX
Microsoft Azure News - December 2024 - BAUG
PDF
Security: The Value of SBOMs
PDF
Device-Edge-Cloud Continuum: Paradigms, Architectures and Applications 1st Ed...
Digital spectacle by using cloud computing
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
Phil Bracikowski [InfluxData] | InfluxDB Cloud Durability Walkthrough | Influ...
3 Pitfalls Everyone Should Avoid with Cloud Data
VLSI Design for Video Coding 2010th Edition Youn
Cloud Computing
Top 6 Practices to Harden Docker Images to Enhance Security
Getting Started with Point Clouds Visualisation and AR/VR
Edge computing in practice using IoT, Tensorflow and Google Cloud
Practical Cloud Native Security With Falco Risk And Threat Detection For Cont...
Interoperability in forge - fossa2010
3 Pitfalls Everyone Should Avoid with Cloud Data
Chaos Engineering: Injecting Failure for Building Resilience in Systems
From printed circuit boards to exploits
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Microsoft Azure News - December 2024 - BAUG
Security: The Value of SBOMs
Device-Edge-Cloud Continuum: Paradigms, Architectures and Applications 1st Ed...

More from Angelo Corsaro (19)

PDF
Zenoh: The Genesis
PDF
zenoh: The Edge Data Fabric
PDF
Zenoh Tutorial
PDF
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
PDF
zenoh: zero overhead pub/sub store/query compute
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
Eastern Sicily
PDF
Cyclone DDS: Sharing Data in the IoT Age
PDF
Programming in Scala - Lecture Four
PDF
Programming in Scala - Lecture Three
PDF
Programming in Scala - Lecture Two
PDF
Programming in Scala - Lecture One
PDF
Data Sharing in Extremely Resource Constrained Envionrments
PDF
The DDS Security Standard
PDF
The Data Distribution Service
PDF
RUSTing -- Partially Ordered Rust Programming Ruminations
PDF
Vortex II -- The Industrial IoT Connectivity Standard
PDF
Happy 2016!
Zenoh: The Genesis
zenoh: The Edge Data Fabric
Zenoh Tutorial
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
zenoh: zero overhead pub/sub store/query compute
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Eastern Sicily
Cyclone DDS: Sharing Data in the IoT Age
Programming in Scala - Lecture Four
Programming in Scala - Lecture Three
Programming in Scala - Lecture Two
Programming in Scala - Lecture One
Data Sharing in Extremely Resource Constrained Envionrments
The DDS Security Standard
The Data Distribution Service
RUSTing -- Partially Ordered Rust Programming Ruminations
Vortex II -- The Industrial IoT Connectivity Standard
Happy 2016!

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release

Fog Computing with Vortex

  • 1. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Angelo Corsaro, PhD Chief Technology Officer angelo.corsaro@prismtech.com Fog Computing with VORTEX
  • 2. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Why do we need Fog Computing?
  • 3. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The majority of IoT systems are today cloud-centric These systems are characterised by device-to- cloud communication and in-cloud analytics Cloud-Centric Architectures
  • 4. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary *IDC *CISCO The number of IoT devices is expected to grow exponentially Too many Devices
  • 5. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary *IDC *CISCOCISCO estimates an average of 6.6 devices per person leading to 50B devices in 2020. Too many Devices
  • 6. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary *IDC *CISCO IDC estimates 27.9 devices per person leading to 212B Too many Devices
  • 7. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial IoT applications such as Smart Grids , Smart Factories, Smart Farming, Connected Vehicles and Smart Cities are not compatible with the assumptions of Cloud Centric Architectures Industrial IoT
  • 8. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary There is sufficient bandwidth to push data to the Cloud. Cloud-Centric Architectures Assumption #1
  • 9. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Smart Factory 0.5 TB of data produced per day
  • 10. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Connectivity is not an issue. A device will (almost) always be connected to the cloud. Cloud-Centric Architectures Assumption #2
  • 11. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Autonomous Vehicles coordination of fast moving autonomous vehicles intermittent connectivity dynamic pairing of devices
  • 12. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The latency induced by cloud-centralised analytics and control is compatible with the dynamic of the IoT system Cloud-Centric Architectures Assumption #3
  • 13. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Latency Constraints
  • 14. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The connectivity cost is negligible Cloud-Centric Architectures Assumption #4
  • 15. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial companies are comfortable in exposing their data to the cloud. Cloud-Centric Architectures Assumption #5
  • 16. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary What is Fog Computing?
  • 17. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but closer to the “Things” Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 18. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryelastic and high-performance computing, storage and communication at the edge Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 19. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog is about reactive cyber-physical applications Fog is about interacting with the physical world
  • 20. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Cloud technologies are not always applicable on the edge because of performance and resource constraints
  • 21. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary A new infrastructure has to be "invented" for the edge, innovating when necessary and reusing when possible
  • 22. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Real-Time Performance and Reliability Location- and Resource- Aware deployment Resource and Device Virtualisation Fog Computing traits
  • 23. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Resource aware provisioning of applications and tenants Tamper Proof Security (in some deployments it is easier to get physical access to the fog platform) Fog Computing traits
  • 24. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Has it been proven?
  • 25. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 26. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 27. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 28. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 29. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 30. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 31. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing with Vortex
  • 32. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices in151 Characters
  • 33. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing Vortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure
  • 34. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex lets data flow where needed transparently while optimising the data sharing Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk Location Transparency
  • 35. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Whenever possible data is shared using Device-to- Device communication Location Transparency Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 36. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary When necessary data sharing is mediated by Vortex Infrastructure, i.e., Vortex Fog and Cloud Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk Location Transparency
  • 37. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary location transparency Cloud Computing Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication Cloud-to-Cloud Communication Device-to-Device Communication Collect | Store | Analyse | Share Collect | Store | Analyse | Share Fog Computing Fog Computing
  • 38. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Performance Vortex delivers low and deterministic latency as well as very high throughput 30 μs peer-to-peer latency 4+ Mmsgs/sec p2p throughput Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 39. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Native Integration with the hottest real-time analytics platforms and CEP Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk Analytics
  • 40. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Security Data-Level security with Pluggable Authentication Access Control and Crypto Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 41. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
  • 42. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car Café and Web are typically used Android / HTML5 based infotainment Lite in typically used in ECU, sensors and onboard analytics
  • 43. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car Vortex Fog also helps defining security boundaries and policies
  • 44. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with car to car communication Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication
  • 45. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols Device-to-Cloud Communication Cloud Analytics Fog Analytics Fog Analytics Fog Analytics
  • 46. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale Device-to-Cloud Communication Cloud Analytics Fog Analytics Fog Analytics Fog Analytics
  • 47. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing will underpin the largest majority of IoT systems Fog Computing Platforms are starting to emerge in the market Vortex is the only Data-Sharing Technology that is Fog-Ready In Summary
  • 48. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing Blog http://bit.ly/fogblog-part-i
  • 49. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary