Michael Crichton’s 1973 sci-fi movie, Westworld, may be where the initial concept of edge and fog computing (as well as the computer virus) first came to life. In the film, androids appeared to operate using an early form of automated response. But the edge and fog we know today, are much more evolved approaches that are actively helping government improve the quality of our everyday lives. Although both concepts have been around for a while, edge and fog (like so many classic sci-fi stories lately, including Westworld) are in the process of being re-imagined. The result is reshaping how government agencies are interacting with citizens and data, and like all good stories, taking our imaginations to new heights.
What are edge and fog computing?
While the original Westworld and (spoiler alert) its unfortunate series of events may be an interesting comparison, I’d like to break the concepts of edge and fog computing down a little more. Cisco coined the term fog computing a few years ago, but not before Westworld’s 1973 premiere. So I guess we can share the idea with Crichton. With traditional cloud computing, you’re switching from processing workloads locally in a data center to leveraging someone else’s remote data center(s) instead (AWS, Azure, Google Cloud, and Oracle). But with fog, control moves away from the cloud and/or your private data center and into the edge of your local/wide area and Internet of Things (IoT) networks. You’re simply bringing that cloud processing capability closer to where the data is born. There the data is processed in a fog node. This eliminates the need to send your data all the way back to the data center, saving time and resources.
Fog is simply bringing the cloud’s processing capabilities back to Earth, where all the action is. Think about it; in nature, fog is just a cloud on the ground. So just think of fog computing as the cloud (with all its computing, storage, and application power) settling back down, closer to the ground, or action, and away from a centralized data center.
But what if you take the next step, and embed your data processing capabilities directly into the end devices? That’s edge computing; actually processing data where the action originates, whether that’s on a pole at an intersection, on a patient’s bedside in rehab, or beneath the Stetson in a processing unit of an artificial hero in Westworld. And it can produce big benefits, especially when used in devices that need to be activated in emergency situations, like gates and locks. This type of function is already happening millions of times every day in our world of IoT connected devices.
From Westworld to real world, and back again.
As IoT and mobile technologies continue to grow, more and more devices are attaching themselves to networks. This is all happening at the edge, where things are a bit looser, the laws at first appear a little less defined, and everyone is pushing a different agenda. It’s a little like the old west. But not in the classic sense. Just like Westworld.
As edge and fog (often just called edge fog) computing have evolved in our world, they also have in Crichton’s. In today’s re-imagined Westworld series on HBO, hundreds of androids (basically end devices) connect to a central network, yet process data and make independent decisions themselves, at the network edge. Their behaviors are generally based on pre-set policies that are designed to limit their actions and have them respond in a certain way, depending on the situation. This is pretty similar to the edge fog approach of today.
What does edge fog computing mean for government?
As a result of edge fog computing, data processing is becoming less centralized. To see the value of pushing decision making to the edge, it’s important to understand that application workloads leveraged by end users are usually pretty forgiving as far as latency and availability. But IoT workloads are not. And with data becoming the new currency, the need for data driven decisions based on time to execute are now critical.
The need for speed, so to speak, is growing in parallel with the IoT. And so is the value of edge fog computing. Use cases for IoT are vast, applying to most every aspect of government. From closing gates on a curvy mountain road in response to severe weather, speeding traffic signal response, or even activating emergency door locks to protect our children at school, the opportunities edge fog computing can provide are key to securing a better quality of life in our communities. In part two of our three part series, we’ll take a closer look at the benefits of edge fog computing for government.
Read Parts 1 through 3
- Part 1 Edge and fog computing: Cutting through the haze
- Part 2 Edge and fog computing: The key to smarter cities?
- Part 3 Edge and fog computing: Key to safer streets?
To learn more about improving the quality of life for your citizens through edge and fog computing, check out:
Cisco Edge Fog Fabric at http://cs.co/EdgeandFogFabric
Cisco Kinetic Edge & Fog Processing Module (EFM) at http://cs.co/KineticDatasheet
Check out the Center for Digital Government’s recent survey on the IoT at http://cs.co/IoTStateandLocalReport
Hello Marcus,
Does edge fog have a role in the modernization of SCADA networks?
What are the ramifications of connecting more government-controlled endpoints to the Internet, and what kind of security measures are available to ensure these devices aren't hacked?
Thanks for your blog!
Vincent,
IoT does play an important role in traditional SCADA networks and will bring even more value in future years. Think of SCADA as just another data source for your IoT environment which will also digest data from CRMs, Customer Reporting engines, Customer/Employee facing Mobile apps, etc. Edge or Fog processing will certainly play a big role as more control capabilities are required/deployed and those will need to be secured in the same manner that we secure IP networks today (defense in depth). Cisco has a complete security architecture that addresses every aspect from end-point, to edge to the DC (private or public).
Hello Marcus and Kenn,
I came back to reread this article, and once again I was struck by this paragraph:
— —
Fog is simply bringing the cloud’s processing capabilities back to Earth, where all the action is. Think about it; in nature, fog is just a cloud on the ground. So just think of fog computing as the cloud (with all its computing, storage, and application power) settling back down, closer to the ground, or action, and away from a centralized data center.
— —
This is a great way to explain "fog computing". Thanks!
Your "edge computing" explanation is just as great:
— —
But what if you take the next step, and embed your data processing capabilities directly into the end devices? That’s edge computing; actually processing data where the action originates, whether that’s on a pole at an intersection, on a patient’s bedside in rehab, or beneath the Stetson in a processing unit of an artificial hero in Westworld.
— —
However, your last paragraph, highlighting the breadth of IoT use cases, puts a spotlight on the large number of places where security will need to play a role in safeguarding our networks.
How much of the security for IoT devices will be provided by intelligent edge fog computing? Is this a topic for exploration in an upcoming post?
Thanks for all the great information!
Vincent, You've motivated a series on Security, so stay tuned. I'll have my business partner Will Ash join in as we explore this topic.