SlideShare a Scribd company logo
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Angelo	Corsaro,	PhD	
Chief	Technology	Officer	
ADLINK	Technologies	Inc.	
angelo.corsaro@adlinktech.com
Fog Computing
Defined
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
State of Practice
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The majority of IoT systems
are today cloud-centric
These systems are
characterised by device-to-
cloud communication and
in-cloud analytics
Cloud-Centric
Architectures
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Why do we need
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
*IDC
*CISCO
Too many Devices
The number of IoT devices is
expected to grow
exponentially
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial IoT applications such
as Smart Grids , Smart
Factories, Smart Farming,
Connected Vehicles and Smart
Cities are not compatible with
the assumptions of Cloud
Centric Architectures
Industrial IoT
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
There is sufficient
bandwidth to push data to
the Cloud.
Cloud-Centric
Architectures
Assumption #1
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Smart Factory
0.5 TB of data
produced per day
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Connectivity is not an
issue. A device will (almost)
always be connected to the
cloud.
Cloud-Centric
Architectures
Assumption #2
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Autonomous
Vehicles
coordination of fast moving
autonomous vehicles
intermittent
connectivity
dynamic pairing of devices
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The latency induced by
cloud-centralised analytics
and control is compatible
with the dynamic of the IoT
system
Cloud-Centric
Architectures
Assumption #3
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Latency
Constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The connectivity cost is
negligible
Cloud-Centric
Architectures
Assumption #4
Cost of connectivity is an
issue in Smart Grids as the
operator has to pay for the
2G/3G/4G data-link
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Industrial companies are
comfortable in exposing
their data to the cloud.
Cloud-Centric
Architectures
Assumption #5
Fog Computing Defined
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
What is
Fog Computing?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but
closer to the “Things”
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that
distributes computing, storage, control and
networking functions closer to the users
along a cloud-to-thing continuum
Fog Computing| fɒg kəmˈpjuːtɪŋ|
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog is about reactive cyber-physical applications
Fog is about interacting with the physical world
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Cloud technologies are not always
applicable on the edge because of
performance and resource constraints
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
A new infrastructure has to be "invented"
for the edge, innovating when necessary
and reusing when possible
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Real-Time Performance and
Reliability
Location- and Resource-
Aware deployment
Resource and Device
Virtualisation
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Resource aware provisioning
of applications and tenants
Tamper Proof Security (in
some deployments it is easier
to get physical access to the
fog platform)
Fog Computing
traits
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
[source: OpenFog Whitepaper http://bit.ly/openfog-wp]
Open Fog
The recently established
OpenFog is accelerating
and facilitating the
expansion, convergence
and interoperability of
Fog computing stacks
Consortium
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Open Fog Reference Architecture
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Has it been proven?
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Barcelona
Smart City Platform
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MEC
MEC is a network architecture concept that enables
Integrated networking, computing and storage
resources into one programmable and unified edge
infrastructure.
Mobile/Multi-access Edge Computing (MEC)
The basic idea behind
MEC is that by running
applications and
performing related
processing tasks
closer to the cellular
customer, network
congestion is reduced
and applications
perform better.
MEC
Fog vs. MEC
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core
The MEC infrastructure resides at the edge of the operator
infrastructure.
The operator own and manages the infrastructure but not the
“things”
MEC Boundaries
User Terminal, Things, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
The Fog infrastructure resides on premises and at the edge of
end-system infrastructure.
The fog infrastructure as well as the “things” are often owned and
managed by the same authority, i.e. smart factory, smart grid, etc.
FOG Boundaries
Fog
External
Network
Things, Machines, User
Terminal, …
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
MECNet-Core Fog
Things, Machines, User
Terminal, …
The Fog and MEC infrastructure exist within different
administrative boundaries
The ability of leveraging Fog, on premises, and MEC at the edge
of the network, will be the ideal situation for demanding IIoT
applications
FOG / MEC Boundaries
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
5G and MEC focus on Real-Fast
Beside the real-fast Fog has to
support Real-Time
Real-Time and Real-Fast are
not the same!
Real-Fast vs. Real-Time
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
0
1
2
3
4
5
Latency
Throughput
R
eal-Tim
e
M
ulti-Tenancy
Security
H
igh
AvailabilityM
anageabilityH
etherogeneity
MEC
FOG
From an high level perspective
MEC and Fog computing aim
at virtualising compute,
storage and networking at the
edge
Yet, their requirements differ
significantly in some areas as
Fog computing deals with OT
systems
MEC / Fog
Needs
Summing UP
MEC and Fog Computing aims at the same high level goal, which is
providing a virtualised compute, storage and communication fabric
Yet they have unique requirements stemming from the target
application domain
Platform that wish to address and unify MEC and Fog computing
need to exploit similarities but more importantly address the
differences
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary

More Related Content

PDF
Fog Computing - DEV.BG 2018
PDF
fog05: The Fog Computing Platform
PDF
Fog Computing with Vortex
PDF
fog05: The Fog Computing Infrastructure
PPTX
FOG COMPUTING- Presentation
PPTX
Fog Computing and the Internet of Things
PDF
Fluid IoT Architectures
PDF
Fog computing
Fog Computing - DEV.BG 2018
fog05: The Fog Computing Platform
Fog Computing with Vortex
fog05: The Fog Computing Infrastructure
FOG COMPUTING- Presentation
Fog Computing and the Internet of Things
Fluid IoT Architectures
Fog computing

What's hot (20)

PDF
Fog Computing with VORTEX
PPTX
Fog computing ( foggy cloud)
PPTX
Fog computing technology
PPTX
Fog Computing
PPTX
Seminar ppt fog comp
PDF
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
DOCX
Fog computing document
PPTX
Fog computing paper presentation
PPT
Fog computing provide security to data in cloud ppt
DOCX
What is fog computing
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
PPTX
Edge-Fog Cloud
PDF
Fog Computing Reality Check: Real World Applications and Architectures
PPTX
Edge-Fog Cloud: Scaling IoT computations on the edge
PDF
Fog computing and internet of things
PDF
Latest Thesis Topics for Fog computing
PPTX
fog computing ppt
PPTX
Fog Computing
PPTX
Fog computing
PDF
Fog computing in IoT
Fog Computing with VORTEX
Fog computing ( foggy cloud)
Fog computing technology
Fog Computing
Seminar ppt fog comp
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Fog computing document
Fog computing paper presentation
Fog computing provide security to data in cloud ppt
What is fog computing
A Study on Cloud and Fog Computing Security Issues and Solutions
Edge-Fog Cloud
Fog Computing Reality Check: Real World Applications and Architectures
Edge-Fog Cloud: Scaling IoT computations on the edge
Fog computing and internet of things
Latest Thesis Topics for Fog computing
fog computing ppt
Fog Computing
Fog computing
Fog computing in IoT
Ad

Viewers also liked (7)

PDF
Data Sharing in Extremely Resource Constrained Envionrments
PDF
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
PDF
RUSTing -- Partially Ordered Rust Programming Ruminations
PPTX
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
PDF
Vortex II -- The Industrial IoT Connectivity Standard
PDF
Getting Started with Vortex
PDF
DDS and OPC UA Explained
Data Sharing in Extremely Resource Constrained Envionrments
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
RUSTing -- Partially Ordered Rust Programming Ruminations
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
Vortex II -- The Industrial IoT Connectivity Standard
Getting Started with Vortex
DDS and OPC UA Explained
Ad

Similar to Fog Computing Defined (20)

PPTX
Fog computing
PPT
Fog computing
PDF
Fog Computing
PPTX
Fog comuting
PDF
Fog Computing and Its Role in the Internet of Things
PDF
fog computing
PDF
Clarifying fog computing and networking 10 questions and answers
PPTX
PPT
FG2.ppt
PPTX
Fog Computing
PDF
A Review- Fog Computing and Its Role in the Internet of Things
PDF
Brief Introduction to Fog computing.pdf
PDF
FOG COMPUTING, what and why a fog computing
PDF
Fog Computing
PDF
Fog security
PDF
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
PDF
Fog Computing: A Platform for Internet of Things and Analytics
DOCX
Seminar report
PDF
Fog Computing: Helping the Internet of Things Realize its Potential
PPTX
FOG COMPUTING-2.pptx fog computing ppt on internship
Fog computing
Fog computing
Fog Computing
Fog comuting
Fog Computing and Its Role in the Internet of Things
fog computing
Clarifying fog computing and networking 10 questions and answers
FG2.ppt
Fog Computing
A Review- Fog Computing and Its Role in the Internet of Things
Brief Introduction to Fog computing.pdf
FOG COMPUTING, what and why a fog computing
Fog Computing
Fog security
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Fog Computing: A Platform for Internet of Things and Analytics
Seminar report
Fog Computing: Helping the Internet of Things Realize its Potential
FOG COMPUTING-2.pptx fog computing ppt on internship

More from Angelo Corsaro (20)

PDF
Zenoh: The Genesis
PDF
zenoh: The Edge Data Fabric
PDF
Zenoh Tutorial
PDF
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
PDF
zenoh: zero overhead pub/sub store/query compute
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
zenoh -- the ZEro Network OverHead protocol
PDF
Eastern Sicily
PDF
Cyclone DDS: Sharing Data in the IoT Age
PDF
Programming in Scala - Lecture Four
PDF
Programming in Scala - Lecture Three
PDF
Programming in Scala - Lecture Two
PDF
Programming in Scala - Lecture One
PDF
The DDS Security Standard
PDF
The Data Distribution Service
PDF
DDS In Action Part II
PDF
DDS in Action -- Part I
PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
PDF
Microservices Architecture with Vortex — Part II
PDF
Happy 2016!
Zenoh: The Genesis
zenoh: The Edge Data Fabric
Zenoh Tutorial
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
zenoh: zero overhead pub/sub store/query compute
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Eastern Sicily
Cyclone DDS: Sharing Data in the IoT Age
Programming in Scala - Lecture Four
Programming in Scala - Lecture Three
Programming in Scala - Lecture Two
Programming in Scala - Lecture One
The DDS Security Standard
The Data Distribution Service
DDS In Action Part II
DDS in Action -- Part I
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Microservices Architecture with Vortex — Part II
Happy 2016!

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Tartificialntelligence_presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Getting Started with Data Integration: FME Form 101
Encapsulation_ Review paper, used for researhc scholars
Tartificialntelligence_presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Assigned Numbers - 2025 - Bluetooth® Document

Fog Computing Defined

  • 1. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Angelo Corsaro, PhD Chief Technology Officer ADLINK Technologies Inc. [email protected] Fog Computing Defined
  • 2. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary State of Practice
  • 3. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The majority of IoT systems are today cloud-centric These systems are characterised by device-to- cloud communication and in-cloud analytics Cloud-Centric Architectures
  • 4. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Why do we need Fog Computing?
  • 5. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary *IDC *CISCO Too many Devices The number of IoT devices is expected to grow exponentially
  • 6. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial IoT applications such as Smart Grids , Smart Factories, Smart Farming, Connected Vehicles and Smart Cities are not compatible with the assumptions of Cloud Centric Architectures Industrial IoT
  • 7. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary There is sufficient bandwidth to push data to the Cloud. Cloud-Centric Architectures Assumption #1
  • 8. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Smart Factory 0.5 TB of data produced per day
  • 9. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Connectivity is not an issue. A device will (almost) always be connected to the cloud. Cloud-Centric Architectures Assumption #2
  • 10. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Autonomous Vehicles coordination of fast moving autonomous vehicles intermittent connectivity dynamic pairing of devices
  • 11. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The latency induced by cloud-centralised analytics and control is compatible with the dynamic of the IoT system Cloud-Centric Architectures Assumption #3
  • 12. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 13. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 14. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Latency Constraints
  • 15. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The connectivity cost is negligible Cloud-Centric Architectures Assumption #4
  • 16. Cost of connectivity is an issue in Smart Grids as the operator has to pay for the 2G/3G/4G data-link
  • 17. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Industrial companies are comfortable in exposing their data to the cloud. Cloud-Centric Architectures Assumption #5
  • 19. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary What is Fog Computing?
  • 20. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryfog computing is like  cloud computing but closer to the “Things” Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 21. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryhorizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum Fog Computing| fɒg kəmˈpjuːtɪŋ|
  • 22. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog is about reactive cyber-physical applications Fog is about interacting with the physical world
  • 23. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Cloud technologies are not always applicable on the edge because of performance and resource constraints
  • 24. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary A new infrastructure has to be "invented" for the edge, innovating when necessary and reusing when possible
  • 25. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Real-Time Performance and Reliability Location- and Resource- Aware deployment Resource and Device Virtualisation Fog Computing traits
  • 26. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Resource aware provisioning of applications and tenants Tamper Proof Security (in some deployments it is easier to get physical access to the fog platform) Fog Computing traits
  • 27. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary [source: OpenFog Whitepaper http://bit.ly/openfog-wp] Open Fog The recently established OpenFog is accelerating and facilitating the expansion, convergence and interoperability of Fog computing stacks Consortium
  • 28. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Open Fog Reference Architecture
  • 29. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Has it been proven?
  • 30. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Barcelona Smart City Platform
  • 31. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 32. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 33. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 34. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MEC
  • 35. MEC is a network architecture concept that enables Integrated networking, computing and storage resources into one programmable and unified edge infrastructure. Mobile/Multi-access Edge Computing (MEC)
  • 36. The basic idea behind MEC is that by running applications and performing related processing tasks closer to the cellular customer, network congestion is reduced and applications perform better. MEC
  • 38. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MECNet-Core The MEC infrastructure resides at the edge of the operator infrastructure. The operator own and manages the infrastructure but not the “things” MEC Boundaries User Terminal, Things, …
  • 39. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary The Fog infrastructure resides on premises and at the edge of end-system infrastructure. The fog infrastructure as well as the “things” are often owned and managed by the same authority, i.e. smart factory, smart grid, etc. FOG Boundaries Fog External Network Things, Machines, User Terminal, …
  • 40. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary MECNet-Core Fog Things, Machines, User Terminal, … The Fog and MEC infrastructure exist within different administrative boundaries The ability of leveraging Fog, on premises, and MEC at the edge of the network, will be the ideal situation for demanding IIoT applications FOG / MEC Boundaries
  • 41. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 5G and MEC focus on Real-Fast Beside the real-fast Fog has to support Real-Time Real-Time and Real-Fast are not the same! Real-Fast vs. Real-Time
  • 42. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 0 1 2 3 4 5 Latency Throughput R eal-Tim e M ulti-Tenancy Security H igh AvailabilityM anageabilityH etherogeneity MEC FOG From an high level perspective MEC and Fog computing aim at virtualising compute, storage and networking at the edge Yet, their requirements differ significantly in some areas as Fog computing deals with OT systems MEC / Fog Needs
  • 43. Summing UP MEC and Fog Computing aims at the same high level goal, which is providing a virtualised compute, storage and communication fabric Yet they have unique requirements stemming from the target application domain Platform that wish to address and unify MEC and Fog computing need to exploit similarities but more importantly address the differences
  • 44. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary