CISCO Fog Computing Overview
CISCO Fog Computing Overview
CISCO Fog Computing Overview
Analyzes the most time-sensitive data at the network edge, close to where it is generated instead of
sending vast amounts of IoT data to the cloud.
Sends selected data to the cloud for historical analysis and longer-term storage.
Todays cloud models are not designed for the volume, variety, and velocity of data that
the IoT generates.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
These billions of new things also represent countless new types of things (Figure 1). Some are machines that
connect to a controller using industrial protocols, not IP. Before this information can be sent to the cloud for
analysis or storage, it must be translated to IP.
Figure 1.
Connecting More and Different Kinds of Things Directly to the Cloud Is Impractical
Compounding the challenge, IoT devices generate data constantly, and often analysis must be very rapid. For
example, when the temperature in a chemical vat is fast approaching the acceptable limit, corrective action must
be taken almost immediately. In the time it takes for temperature readings to travel from the edge to the cloud for
analysis, the opportunity to avert a spoiled batch might be lost.
Handling the volume, variety, and velocity of IoT data requires a new computing model. The main requirements are
to:
Minimize latency: Milliseconds matter when you are trying to prevent manufacturing line shutdowns or
restore electrical service. Analyzing data close to the device that collected the data can make the difference
between averting disaster and a cascading system failure.
Analyzing data close to the device that collected the data can make the difference between
averting disaster and a cascading system failure.
Conserve network bandwidth: Offshore oilrigs generate 500 GB of data weekly. Commercial jets
generate 10 TB for every 30 minutes of flight. It is not practical to transport vast amounts of data from
thousands or hundreds of thousands of edge devices to the cloud. Nor is it necessary, because many
critical analyses do not require cloud-scale processing and storage.
Address security concerns: IoT data needs to be protected both in transit and at rest. This requires
monitoring and automated response across the entire attack continuum: before, during, and after.
Operate reliably: IoT data is increasingly used for decisions affecting citizen safety and critical
infrastructure. The integrity and availability of the infrastructure and data cannot be in question.
Collect and secure data across a wide geographic area with different environmental conditions: IoT
devices can be distributed over hundreds or more square miles. Devices deployed in harsh environments
such as roadways, railways, utility field substations, and vehicles might need to be ruggedized. That is not
the case for devices in controlled, indoor environments.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
Move data to the best place for processing: Which place is best depends partly on how quickly a
decision is needed. Extremely time-sensitive decisions should be made closer to the things producing and
acting on the data. In contrast, big data analytics on historical data needs the computing and storage
resources of the cloud.
Traditional cloud computing architectures do not meet all of these requirements. The prevailing approachmoving
all data from the network edge to the data center for processingadds latency. Traffic from thousands of devices
soon outstrips bandwidth capacity. Industry regulations and privacy concerns prohibit offsite storage of certain
types of data. In addition, cloud servers communicate only with IP, not the countless other protocols used by IoT
devices. The ideal place to analyze most IoT data is near the devices that produce and act on that data. We call it
Fog computing.
approaching 40 percent. There is good reason: analyzing IoT data close to where it is collected minimizes latency.
It offloads gigabytes of network traffic from the core network, and it keeps sensitive data inside the network.
Analyzing IoT data close to where it is collected minimizes latency. It offloads gigabytes of network traffic from the
core network. And it keeps sensitive data inside the network.
Figure 2.
The Fog Extends the Cloud Closer to the Devices Producing Data
DATACENTER/CLOUD
FOG
DEVICE
Cisco Public
Fog applications are as diverse as the Internet of Things itself. What they have in common is monitoring or
analyzing real-time data from network-connected things and then initiating an action. The action can involve
machine-to-machine (M2M) communications or human-machine interaction (HMI). Examples include locking a
door, changing equipment settings, applying the brakes on a train, zooming a video camera, opening a valve in
response to a pressure reading, creating a bar chart, or sending an alert to a technician to make a preventive
repair. The possibilities are unlimited.
1
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
Production fog applications are rapidly proliferating in manufacturing, oil and gas, utilities, transportation, mining,
and the public sector.
railways, etc.
Thousands or millions of things across a large geographic area are generating data.
The most time-sensitive data is analyzed on the fog node closest to the things generating the data. In a
Cisco Smart Grid distribution network, for example, the most time-sensitive requirement is to verify that
protection and control loops are operating properly. Therefore, the fog nodes closest to the grid sensors can
look for signs of problems and then prevent them by sending control commands to actuators.
Data that can wait seconds or minutes for action is passed along to an aggregation node for analysis and
action. In the Smart Grid example, each substation might have its own aggregation node that reports the
operational status of each downstream feeder and lateral.
Data that is less time sensitive is sent to the cloud for historical analysis, big data analytics, and long-term
storage (see sidebar). For example, each of thousands or hundreds of thousands of fog nodes might send
periodic summaries of grid data to the cloud for historical analysis and storage.
Table 1.
Cloud
Response time
Milliseconds to subsecond
Seconds to minutes
Application
examples
Visualization
Simple analytics
Graphical dashboards
Transient
Months or years
Geographic
coverage
Wider
Global
Haptics is controlling technology using the sense of touch. A realistic experience requires feedback in less than 1 millisecond.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
Receive feeds from IoT devices using any protocol, in real time
Run IoT-enabled applications for real-time control and analytics, with millisecond response time
Performs analysis on the IoT data and data from other sources to gain business insight
Can send new application rules to the fog nodes based on these insights
Greater business agility: With the right tools, developers can quickly develop fog applications and deploy
them where needed. Machine manufacturers can offer MaaS to their customers. Fog applications program
the machine to operate in the way each customer needs.
Better security: Protect your fog nodes using the same policy, controls, and procedures you use in other
parts of your IT environment. Use the same physical security and cybersecurity solutions.
Deeper insights, with privacy control: Analyze sensitive data locally instead of sending it to the cloud for
analysis. Your IT team can monitor and control the devices that collect, analyze, and store data.
Lower operating expense: Conserve network bandwidth by processing selected data locally instead of
sending it to the cloud for analysis.
Conclusion
Fog computing gives the cloud a companion to handle the two exabytes of data generated daily from the Internet of
Things. Processing data closer to where it is produced and needed solves the challenges of exploding data
volume, variety, and velocity.
Fog computing accelerates awareness and response to events by eliminating a round trip to the cloud for analysis.
It avoids the need for costly bandwidth additions by offloading gigabytes of network traffic from the core network. It
also protects sensitive IoT data by analyzing it inside company walls. Ultimately, organizations that adopt fog
computing gain deeper and faster insights, leading to increased business agility, higher service levels, and
improved safety.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Printed in USA
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
C11-734435-00
04/15
Page 6 of 6