Not in the Cloud, but in the…Fog?

Fog Computing vs Edge Computing

By Richard Arneson

Just when everybody got comfortable bandying about the cloud, along comes another meteorology-related tech term―fog. Yes, we now have Fog Computing. While in its infancy (in fact, the OpenFog Consortium was created only three (3) short years ago), it will likely become another oft-used word in the networking vernacular.
The consortium was founded in 2015 by Cisco (which coined the term), ARM HoldingsDell EMC, IntelMicrosoft, and Princeton University, and was a response to the number and precipitous growth of IoT devices. To accommodate those growing numbers (over 9 billion currently in use, estimated to be over 21 billion by 2020), they saw the need to extend cloud computing to the edge. And as the consortium sees it, moving to the edge is best described as moving to the fog.

Fog Computing sounds suspiciously like Edge Computing

Yes, fog and edge computing sound like they’re one and the same, but they are indeed different. They both manage, store and process data at the edge, but, according to Cisco’s Helder Antunes, who is an OpenFog Consortium member, “Edge computing is a component, or a subset of Fog Computing. Think of Fog Computing as the way data is processed from where it is created to where it will be stored. Edge computing refers just to data being processed close to where it is created. Fog Computing encapsulates not just that edge processing, but also the network connections needed to bring that data from the edge to its end point.”

The benefits of Fog Computing

With Fog Computing, organizations have more options for processing data, which is beneficial for applications that require data to be processed more quickly―for instance, an IoT device that needs to respond instantaneously, or as close to that as possible.
By creating low-latency connections between devices, Fog Computing can reduce the amount of bandwidth needed when compared to having it sent to the cloud for processing. It can even be used when there’s no bandwidth connection, which, of course, means it must be processed very, very close to where it was created. And if security is a concern, which it always is, Fog Computing can be protected by virtual firewalls.

The OpenFog Consortium’s three (3) goals for Fog Computing

The OpenFog Consortium’s goal is to create for Fog Computing an open reference architecture, build test beds and operational models, define and advance the technology, educate the marketplace, and promote business development with Fog Computing. It developed and outlined three (3) goals that Fog Computing needs to address and support:

  1. Horizontal scalability, which means it should serve the needs of multiple industries.
  2. The ability to operate across the continuum that exists between IoT devices and the cloud.
  3. Serve as a system-level technology that extends IoT devices over the network edge, through to the cloud, and across an array of network protocol layers.

Before you get too comfortable using the term Fog Computing, get ready for another one that’s slowly gaining steam―Mist Computing.
For more information about Cloud, Edge, or Fog―even Mist―Computing, contact one of the tenured networking professionals at GDT. They maintain the highest certification levels in the industry, and have helped companies of all sizes, and from all industries, realize their digital transformation goals. You can reach them at Engineering@gdt.com. They’d love to hear from you.

Author

Share this article

You might also like:

Are you making the most of your Cisco renewals? Most organizations treat renewals as tactical exercises: a check-the-box task to extend coverage, process a purchase order, and avoid service disruption. But this reactive approach misses a tremendous opportunity. When approached strategically, a Cisco renewal can be far more than a

You may have already heard, but if not, I’m pleased to inform you that HPE has officially completed its acquisition of Juniper Networks. First announced back in January of 2024, the HPE Juniper acquisition is now a done deal. Juniper’s CEO, Rami Rahim, is charged with leading the HPE Networking

The Cisco True Forward: How to avoid surprise costs

It started with an invoice they didn’t expect—$280,000 in unbudgeted costs tied to licenses they didn’t even know they were overusing. That was the moment this healthcare provider realized how important Cisco True Forward visibility really is. And they’re not alone.  For organizations that rely on Cisco to power critical