IoT, the Cloud, and Fog Computing Concepts

Fog Computing Concepts

The Internet of Things (IoT) is increasingly part of all of our lives, personally and business-wise, and the efficiencies and conveniences it offers will likely encourage even greater adoption. An enormous amount of data is also being generated through IoT devices, creating a need for larger data silos and generating more network and internet traffic than before. Thanks to instruments such as cloud computing, this data and traffic can be accommodated, but we may also see more involvement of ‘fog computing’ in the not too distant future.

The Cloud & IoT

Thanks to the cloud we’re able to deliver a variety of data types through the internet to remote data centers. According to IBM, the six categories of cloud computing include public, private and hybrid cloud, along with software as a service, infrastructure as a service, and platform as a service. All of these separate classifications have their own role to play in the support of IoT and ensuring the connection of devices and subsequent processes run smoothly.

Both the Cloud and IoT promise, and generally deliver, increased productivity and efficiency to our lives, feeding off each other for greater cost savings, improved collaboration, insights and analytical predictions, and much more. Thanks to the cloud, costings of computing resources have decreased through the characteristic pay-as-you-use model implemented by cloud Service Providers, and businesses find themselves more able to avail themselves of necessary services as they pick and choose from a selection of products that are easily scalable and highly customizable. The speed and agility of cloud services further enable IoT applications that run in real-time and are continuously connected, and with global reach, applications can be deployed quickly and easily worldwide. The tech giants already provide many popular IoT cloud platforms, including Google Cloud Platform, Amazon Web Services, Salesforce IoT Cloud, and Microsoft Azure IoT Suite, and a range of bespoke solutions exist too.

For some time, the cloud and IoT have been considered inseparable, and over the last few years we’ve seen cloud advances that better serve IoT. However, more recently the developments of fog computing have started shaking up the status quo.

Fog Computing

What is Fog computing? It’s sometimes also referred to as edge computing but, in fact, a distinct technology, involves pushing processing and intelligence capabilities closer to where data originates. I.e. with regards to the IoT, fog computing drives the cloud closer to IoT devices and the data they generate. Fog nodes are devices that can be deployed anywhere within a physical network, and as a result, any device with network connectivity, storage capability, and computing means can be a fog node, including switches, video surveillance cameras, and routers. Fog computing, using these fog nodes, is able to analyze time-sensitive data close to generation points, or at the ‘edge’ of the network, instead of relying on the transfer of IoT data to the cloud, and significantly sends only selected data to the cloud for long-term storage and historical analysis. Benefits include diminished latency, bandwidth savings, security improvements, and more rapid data operations and analysis.

The Cloud vs. Fog?

Though offering some very definite benefits over cloud with regards to IoT, fog computing is not a substitute for cloud computing, but rather works in collaboration with it for resource optimization; fog computing is merely addressing a challenge that IoT created for cloud computing with its ever-increasing data creation and rising need for speedy data processing. Thanks to intelligent processing of data through fog computing at network peripheries, the cloud is left to more relevant tasks while IoT applications are advanced and data flows are better organized. Most experts agree that the partnership of cloud and fog computing will accelerate IoT adoption and push it to greater efficiencies and outputs, benefiting both the enterprise and individual user.

By Jennifer Klostermann

Gary Bernstein
Managing Your Internal IT Your company's internal IT team is responsible for keeping things running smoothly, and they deserve all the support you can give them. Here are ten ways to make their lives easier ...
Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
Gary Bernstein
Test Data Management How do you test your data management systems? With Delphix, you can automate your tests by running your data against a virtual copy of your production environment. Today, the amount of data ...
Brian Rue
What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...
Louis
Why Services CPQ Is Too Slow Today When PS organizations compete in sales cycles, the first competitor to have a complete quote with accurate pricing, schedules, and an engagement plan will often win. However, getting ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.