SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
White Paper
Benefits
Only Cisco Fog computing solutions provide the
following benefits:
● Data privacy: When necessary, analyze
sensitive data within the building instead of
sending it to a remote data center. Cisco Fog
Data Services applies your policy to determine
the best place for analysis.
● Comprehensive security: Protect fog nodes
using the same Cisco physical security and
cybersecurity solutions you use to protect
other IT assets. These solutions provide the
capabilities you need before, during, and after
an attack.
● Business agility: Gain business insights
more quickly by hosting applications closer to
your IoT devices and analyzing data closer to
the source.
● Rapid innovation: Create and deploy new
applications more quickly by using our
infrastructure-as-a-service (IaaS) and
platform-as-a-service (PaaS) offerings. Or
skip development altogether by taking
advantage of industry-specific fog applications
from our ecosystem partners.
● Lower operational expense: Simplify
management using Cisco Prime or the Cisco
Industrial Operations Kit. Conserve network
bandwidth by analyzing data on fog nodes,
when appropriate, instead of sending data to
the cloud for analysis.
Cisco Fog Computing Solutions: Unleash the
Power of the Internet of Things
Connect things. Analyze and act on the data they produce in milliseconds. Then send
the right data to the cloud for big-data analytics and storage.
The Internet of Things (IoT) speeds up awareness and
response to events. It’s transforming whole industries, including
manufacturing, oil and gas, utilities, transportation, public safety,
and local government.
But the IoT requires a new kind of infrastructure. The cloud by
itself can’t connect and analyze data from thousands and millions
of different kinds of things spread out over large areas. Capturing
the power of the IoT requires a solution that can:
● Connect new kinds of things to your network. Some of them
might be in harsh environments. Others might communicate
using industrial protocols, not IP.
● Secure the things that produce data. And secure the data as it
travels from the network edge to the cloud. This requires a
combination of physical security and cybersecurity.
● Handle an unprecedented volume, variety, and velocity of data.
Billions of previously unconnected devices are generating more
than two exabytes of data each day. Sending all of it to the cloud
for analysis and storage is not practical. Plus, in the time it takes
to send data to the cloud for analysis, the opportunity to act on it
might be gone.
Cisco
®
Fog computing solutions meet all of these requirements. They’re part of the Cisco IoT System, a
comprehensive set of products for deploying, accelerating value, and innovating with the Internet of Things. Cisco
Fog computing solutions include everything you need to:
● Connect any kind of IoT device.
● Secure your IoT devices and protect the data they produce as it travels between the network edge and
the cloud.
● Quickly develop and deploy fog applications.
● Direct data to the best place for analysis: fog nodes or your data center cloud platform. The decision
depends on how time-sensitive the decision is as well as data-privacy requirements.
● Automate provisioning and simplify management of large numbers of fog nodes spread out over
large areas.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Cisco Fog Computing Solution Components
Get everything you need to build a Fog computing solution from the Cisco IoT System. It includes products from
Cisco and our partners for:
● Network connectivity
● Physical and cybersecurity
● Fog application development and hosting
● Data analytics
● Management and automation
Network Connectivity
Choose from a wide variety of fog nodes to connect your IoT devices. Options include Cisco routers, switches,
wireless access points, and video surveillance cameras, and Cisco Unified Computing System (UCS) servers.
All Cisco fog nodes have converged compute, networking, and storage, which simplifies management and
reduces power and space requirements. You can develop and enhance IoT applications in the cloud, and then
deploy them to run in the cloud and in the fog. The same application can run on different kinds of fog nodes
without modifications.
Integrated Physical Security and Cybersecurity
IoT data needs to be protected on fog nodes as well as in transit from fog nodes to the cloud. To control physical
access to fog nodes deployed in remote areas, such as utility field substations or alongside roadways and railways,
use Cisco video surveillance and access control solutions.
Protect data as it travels between fog nodes and the cloud by using Cisco cybersecurity solutions. They provide
protection before, during, and after attacks. For example, detect anomalous activity using Cisco NetFlow, Cisco
TrustSec, and Cisco Identity Services Engine (ISE). Prevent breaches using Cisco Advanced Malware Protection.
Respond to anomalous activity by automatically enforcing security policy. With Cisco Intrusion Prevention System
(IPS), the security policy can take into account the target of the threat. In IT environments, the response to a threat
might be to quarantine or shut a system. In an operational technology (OT) environment, the response to the same
threat might be to alert system operators who have the knowledge to decide on the best action.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Application Platform
To simplify fog application development, we’ve replicated the familiar cloud application development model. That’s
software as a service (SaaS) built on PaaS and IaaS. Here’s how it works:
● IaaS: Host new or existing applications on fog nodes. Use the Cisco IOx API, which combines the Cisco
IOS
®
operating system and Linux (Figure 1). Cisco IOx currently works with Cisco routers. A manufacturer,
for example, could use Cisco IOx to host Rockwell FactoryTalk software on factory-floor routers. Using
Cisco IOx APIs, your fog applications can communicate with IoT devices that use any protocol. Fog
applications can also send IoT data to the cloud by translating non-standard and proprietary protocols to IP.
● PaaS: Develop fog applications. Our first IoT PaaS offering, called Cisco DSX, simplifies fog application
development in several ways:
◦ Device abstraction: Fog applications need to communicate with many types of IoT devices. Creating a
separate application for each vendor’s temperature sensor, for example, would be impractical. Cisco
DSX saves application developers this effort by providing an abstracted view of IoT devices.
◦ Support for multiple development environments. IoT applications that deliver machine as a service
(MaaS) are typically developed in various environments and programming languages. With Cisco DSX,
fog nodes can support multiple development environments.
◦ Simplified management of fog applications. Managing a growing number of fog applications would also
be impractical. Cisco DSX simplifies management and automates policy enforcement.
● SaaS: Offer MaaS. Using Cisco DSX, a robot vendor, for example, can specify the functions a particular
customer can use. The customer pays only for these features. The vendor can later give the customer
access to additional features by making a simple software change from headquarters.
How Cisco IOx Works
Cisco IOx hosts applications in a Guest Operating System (GOS) that runs on a hypervisor on a Cisco fog node (Figure 1).
Cisco IOx comes with Yocto Linux, but developers can use any operating system.
Figure 1. Cisco IOx Makes It Possible to Offer Fog Infrastructure as a Service
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Data Analytics: Cisco Fog Data Services
Manage the volume, variety, and velocity of IoT data by using Cisco Fog Data Services (Table 1). These
services direct data to the right place for analysis—cloud or fog—based on your policies (Figure 2). Analyzing
IoT data close to where it’s collected minimizes latency. It offloads gigabytes of network traffic from the core
network. And it keeps sensitive data inside the network. Developers access the Cisco Fog Data Services as
REST APIs through Cisco DevNet.
Table 1. Cisco Fog Data Services
Type of Service What the Service Does
Coordinate what happens in the
cloud versus the fog
Applies business rules to decide which data to process locally and which to send to cloud.
Dynamically adjusts rules based on pattern recognition, prediction, and anomaly detection
Analyze Identifies data that requires action, such as a temperature reading above or below a specified threshold
Secure Makes data anonymous by hiding the source
Figure 2. Fog Data Services Coordinate the Movement of Data from Fog to Cloud
To understand the value of Cisco Fog Data Services, think about high-speed commuter rail systems. Constantly
streaming live video over the cellular network would be prohibitively costly. Therefore, most operators store video
from onboard video systems on the train, waiting to transmit it until the train arrives at a station with Wi-Fi. If the
train derails, however, streaming video over the cellular network becomes worthwhile because passenger safety is
at stake. Using Cisco Fog Data Services, the application developers could write a rule stating that if sensors detect
hard braking and train tipping, live video should be streamed over the cellular network to the operations center.
Management and Automation
Depending on the industry and application, fog nodes can number in the hundreds, thousands, or
tens of thousands. Automate provisioning and simplify management of your fog nodes using Cisco
management applications.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Organizations that have field area networks, including utilities and transportation and mining companies, can
manage fog nodes using the Cisco Connected Grid Network Management System (CGNMS), which is part of the
Cisco Industrial Operations Kit (IOK). Cisco IOK is a one-box solution: a Cisco UCS server with virtualized
services, such as virtual router; network management; security; authentication, authorization, and accounting
(AAA); zero-touch deployment; a network server; and a self-configuration tool. Virtualized servers and routers
reduce upfront deployment and ongoing management costs. And included scripts reduce the time to configure
network services from weeks to days.
Manufacturers manage their fog nodes using Cisco Prime Infrastructure. Administrators use a single interface to
manage the network, fog nodes, applications, and users.
You can also deploy your own management and automation tools on Cisco fog nodes, using Cisco IOx APIs.
Use Cases
Rails Real-time intelligence about conditions and events on trains, trackside, at stations, and the operations center helps you:
● Improve passenger safety: Analyze and correlate data from ruggedized cameras on the trains and at stations. Monitor
sensors on wheels and brakes to determine when parts need service before failure causes an accident. Automatically
stream video from onboard video surveillance cameras to the operations center if sensors detect a derailed car.
● Thwart cybersecurity attacks on critical operational systems: Then take automated actions such as suspending
operations or transferring control to a failover system.
● Alert drivers to treacherous conditions ahead: Fog nodes gather sensor data on tracks and trains to detect unsafe
conditions. Drivers are automatically alerted so that they can adjust speed to safe levels. Supervisors also receive alerts if
the train is operated in an unsafe manner.
● Increase rider satisfaction: Provide Wi-Fi in rail cars. The access points connect to onboard fog nodes. In addition to
providing passenger Wi-Fi, the fog nodes connect with trackside Wi-Fi access nodes to relay real-time information about
the various systems on the train.
Manufacturing ● Increase agility: Quickly change production lines and introduce new products. Fog nodes can translate instructions from
IP to the proprietary industrial protocols used by plant-floor equipment.
● Reduce downtime: Avoid costly equipment downtime by performing predictive maintenance. Fog nodes collect machine
data and report early signs of problems.
● Secure machines and data: Analyze data from network devices to detect the earliest signs of network attacks that could
threaten personnel or plant safety.
● Authorize access to machines: Before granting access to a machine, verify that the person is who he or she claims to
be and is authorized to use that specific machine.
● Continually confirm that safety systems are intact: Analyze machine data that’s transmitted in different formats, in
real-time. Shut down compromised equipment automatically, without waiting for a human to respond to an alert.
Utilities ● Restore power more quickly: Fog nodes gather data from the power plant, grid, substation, and customer endpoints.
They continually analyze the data to identify incipient problems and alert the system operator.
● Detect potential physical security breaches: Ruggedized cameras at remote field substations detect breaches, and
also correlate events across multiple locations.
● Detect potential cybersecurity breaches: Automated response helps to prevent infections that could jeopardize safety.
● Reduce maintenance costs and increase system reliability: Fog nodes gather data from critical systems and look for
evidence that systems need maintenance. Predictive maintenance helps to prevent outages and can lower costs.
Diagnose and solve problems from anywhere. Sensors throughout the system send alerts about power fluctuation, spikes,
and other critical events.
Why Cisco?
Everything You Need and a Broad Selection
Only Cisco provides everything you need to develop, host, and manage applications that span from cloud to fog:
● Network connectivity: Choose from many different types of fog nodes, including switches, routers, Cisco
UCS servers, and video surveillance cameras. Ruggedized versions are available.
● Security: Secure your fog nodes and data using your existing Cisco physical security and
cybersecurity solutions.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
● Analytics: Direct data to the right place for analysis, either a fog node or your cloud platform, using Cisco
Fog Data Services. The policy can state that latency-sensitive data is to be analyzed on fog nodes.
● Management and automation: Simplify deployment and management of large numbers of fog nodes using
Cisco Prime or Cisco CGNMS.
● Application platform: Get innovative with the Internet of Things by using Cisco IOx APIs and Cisco DSX to
very rapidly develop fog applications. The same application can run on any Cisco fog node: switch, router,
Cisco UCS server, or video surveillance camera.
IoT Leadership and Investments
Cisco is actively involved in the industry groups developing cloud and fog standards. That means the solutions you
get from us reflect the latest thinking and are continually updated to the latest standards. We are also cultivating
startups working on promising Fog computing innovations.
IoT Ecosystem Partners
Our growing ecosystem of partners is developing cloud-to-fog applications for industries such as manufacturing, oil
and gas, utilities, transportation, public safety, and local government. Using a commercial application can speed up
innovation while saving time and development costs.
IoT Services for Your Industry
Gain deeper insights into the IoT data you collect in the cloud with Cisco Connected Analytics software portfolio.
Use it to view real-time information, spot trends sooner, and make predictions that give you the lead. Supplement
this information by engaging Cisco Services for data virtualization, sophisticated data analytics consulting, and data
science services.
Next Steps
Fog computing is here today. It can make your business more agile, faster to respond, and more innovative with
IoT. And everything you need is available from one vendor, us.
To learn more about the Cisco IoT System, visit www.cisco.com/go/iot.
For APIs to develop IoT applications, visit Cisco DevNet: https://developer.cisco.com/iot.
Printed in USA C11-734589-00 05/15

Contenu connexe

Tendances

Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Jiang Zhu
 

Tendances (20)

Data, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for ChangeData, Technology, and Innovation: Platform for Change
Data, Technology, and Innovation: Platform for Change
 
Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Aws IoT and robotics reinvent attendee guide 2021
Aws IoT and robotics reinvent attendee guide 2021Aws IoT and robotics reinvent attendee guide 2021
Aws IoT and robotics reinvent attendee guide 2021
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on Openstack
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathon
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Cisco Kinetic. Раскрывая ценность данных
Cisco Kinetic. Раскрывая ценность данныхCisco Kinetic. Раскрывая ценность данных
Cisco Kinetic. Раскрывая ценность данных
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsCisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, Solutions
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 

Similaire à Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 

Similaire à Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things (20)

Cisco Fog Strategy For Big and Smart Data
Cisco Fog Strategy For Big and Smart DataCisco Fog Strategy For Big and Smart Data
Cisco Fog Strategy For Big and Smart Data
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Presentation capturing the cloud opportunity
Presentation   capturing the cloud opportunityPresentation   capturing the cloud opportunity
Presentation capturing the cloud opportunity
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
CapAug
CapAugCapAug
CapAug
 
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity AugmentationCisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 

Plus de HarshitParkar6677

Plus de HarshitParkar6677 (20)

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
D dos attack
D dos attackD dos attack
D dos attack
 
Notes chapter 6
Notes chapter  6Notes chapter  6
Notes chapter 6
 
Interface notes
Interface notesInterface notes
Interface notes
 
Chapter6 2
Chapter6 2Chapter6 2
Chapter6 2
 
Chapter6
Chapter6Chapter6
Chapter6
 
8086 cpu 1
8086 cpu 18086 cpu 1
8086 cpu 1
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
 
Notes arithmetic instructions
Notes arithmetic instructionsNotes arithmetic instructions
Notes arithmetic instructions
 
Notes all instructions
Notes all instructionsNotes all instructions
Notes all instructions
 
Notes aaa aa
Notes aaa aaNotes aaa aa
Notes aaa aa
 
Notes 8086 instruction format
Notes 8086 instruction formatNotes 8086 instruction format
Notes 8086 instruction format
 
Misc
MiscMisc
Misc
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Chapter3 program flow control instructions
Chapter3 program flow control instructionsChapter3 program flow control instructions
Chapter3 program flow control instructions
 
Chapter3 8086inst stringsl
Chapter3 8086inst stringslChapter3 8086inst stringsl
Chapter3 8086inst stringsl
 

Dernier

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Dernier (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

  • 1. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6 White Paper Benefits Only Cisco Fog computing solutions provide the following benefits: ● Data privacy: When necessary, analyze sensitive data within the building instead of sending it to a remote data center. Cisco Fog Data Services applies your policy to determine the best place for analysis. ● Comprehensive security: Protect fog nodes using the same Cisco physical security and cybersecurity solutions you use to protect other IT assets. These solutions provide the capabilities you need before, during, and after an attack. ● Business agility: Gain business insights more quickly by hosting applications closer to your IoT devices and analyzing data closer to the source. ● Rapid innovation: Create and deploy new applications more quickly by using our infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) offerings. Or skip development altogether by taking advantage of industry-specific fog applications from our ecosystem partners. ● Lower operational expense: Simplify management using Cisco Prime or the Cisco Industrial Operations Kit. Conserve network bandwidth by analyzing data on fog nodes, when appropriate, instead of sending data to the cloud for analysis. Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things Connect things. Analyze and act on the data they produce in milliseconds. Then send the right data to the cloud for big-data analytics and storage. The Internet of Things (IoT) speeds up awareness and response to events. It’s transforming whole industries, including manufacturing, oil and gas, utilities, transportation, public safety, and local government. But the IoT requires a new kind of infrastructure. The cloud by itself can’t connect and analyze data from thousands and millions of different kinds of things spread out over large areas. Capturing the power of the IoT requires a solution that can: ● Connect new kinds of things to your network. Some of them might be in harsh environments. Others might communicate using industrial protocols, not IP. ● Secure the things that produce data. And secure the data as it travels from the network edge to the cloud. This requires a combination of physical security and cybersecurity. ● Handle an unprecedented volume, variety, and velocity of data. Billions of previously unconnected devices are generating more than two exabytes of data each day. Sending all of it to the cloud for analysis and storage is not practical. Plus, in the time it takes to send data to the cloud for analysis, the opportunity to act on it might be gone. Cisco ® Fog computing solutions meet all of these requirements. They’re part of the Cisco IoT System, a comprehensive set of products for deploying, accelerating value, and innovating with the Internet of Things. Cisco Fog computing solutions include everything you need to: ● Connect any kind of IoT device. ● Secure your IoT devices and protect the data they produce as it travels between the network edge and the cloud. ● Quickly develop and deploy fog applications. ● Direct data to the best place for analysis: fog nodes or your data center cloud platform. The decision depends on how time-sensitive the decision is as well as data-privacy requirements. ● Automate provisioning and simplify management of large numbers of fog nodes spread out over large areas.
  • 2. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6 Cisco Fog Computing Solution Components Get everything you need to build a Fog computing solution from the Cisco IoT System. It includes products from Cisco and our partners for: ● Network connectivity ● Physical and cybersecurity ● Fog application development and hosting ● Data analytics ● Management and automation Network Connectivity Choose from a wide variety of fog nodes to connect your IoT devices. Options include Cisco routers, switches, wireless access points, and video surveillance cameras, and Cisco Unified Computing System (UCS) servers. All Cisco fog nodes have converged compute, networking, and storage, which simplifies management and reduces power and space requirements. You can develop and enhance IoT applications in the cloud, and then deploy them to run in the cloud and in the fog. The same application can run on different kinds of fog nodes without modifications. Integrated Physical Security and Cybersecurity IoT data needs to be protected on fog nodes as well as in transit from fog nodes to the cloud. To control physical access to fog nodes deployed in remote areas, such as utility field substations or alongside roadways and railways, use Cisco video surveillance and access control solutions. Protect data as it travels between fog nodes and the cloud by using Cisco cybersecurity solutions. They provide protection before, during, and after attacks. For example, detect anomalous activity using Cisco NetFlow, Cisco TrustSec, and Cisco Identity Services Engine (ISE). Prevent breaches using Cisco Advanced Malware Protection. Respond to anomalous activity by automatically enforcing security policy. With Cisco Intrusion Prevention System (IPS), the security policy can take into account the target of the threat. In IT environments, the response to a threat might be to quarantine or shut a system. In an operational technology (OT) environment, the response to the same threat might be to alert system operators who have the knowledge to decide on the best action.
  • 3. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6 Application Platform To simplify fog application development, we’ve replicated the familiar cloud application development model. That’s software as a service (SaaS) built on PaaS and IaaS. Here’s how it works: ● IaaS: Host new or existing applications on fog nodes. Use the Cisco IOx API, which combines the Cisco IOS ® operating system and Linux (Figure 1). Cisco IOx currently works with Cisco routers. A manufacturer, for example, could use Cisco IOx to host Rockwell FactoryTalk software on factory-floor routers. Using Cisco IOx APIs, your fog applications can communicate with IoT devices that use any protocol. Fog applications can also send IoT data to the cloud by translating non-standard and proprietary protocols to IP. ● PaaS: Develop fog applications. Our first IoT PaaS offering, called Cisco DSX, simplifies fog application development in several ways: ◦ Device abstraction: Fog applications need to communicate with many types of IoT devices. Creating a separate application for each vendor’s temperature sensor, for example, would be impractical. Cisco DSX saves application developers this effort by providing an abstracted view of IoT devices. ◦ Support for multiple development environments. IoT applications that deliver machine as a service (MaaS) are typically developed in various environments and programming languages. With Cisco DSX, fog nodes can support multiple development environments. ◦ Simplified management of fog applications. Managing a growing number of fog applications would also be impractical. Cisco DSX simplifies management and automates policy enforcement. ● SaaS: Offer MaaS. Using Cisco DSX, a robot vendor, for example, can specify the functions a particular customer can use. The customer pays only for these features. The vendor can later give the customer access to additional features by making a simple software change from headquarters. How Cisco IOx Works Cisco IOx hosts applications in a Guest Operating System (GOS) that runs on a hypervisor on a Cisco fog node (Figure 1). Cisco IOx comes with Yocto Linux, but developers can use any operating system. Figure 1. Cisco IOx Makes It Possible to Offer Fog Infrastructure as a Service
  • 4. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6 Data Analytics: Cisco Fog Data Services Manage the volume, variety, and velocity of IoT data by using Cisco Fog Data Services (Table 1). These services direct data to the right place for analysis—cloud or fog—based on your policies (Figure 2). Analyzing IoT data close to where it’s collected minimizes latency. It offloads gigabytes of network traffic from the core network. And it keeps sensitive data inside the network. Developers access the Cisco Fog Data Services as REST APIs through Cisco DevNet. Table 1. Cisco Fog Data Services Type of Service What the Service Does Coordinate what happens in the cloud versus the fog Applies business rules to decide which data to process locally and which to send to cloud. Dynamically adjusts rules based on pattern recognition, prediction, and anomaly detection Analyze Identifies data that requires action, such as a temperature reading above or below a specified threshold Secure Makes data anonymous by hiding the source Figure 2. Fog Data Services Coordinate the Movement of Data from Fog to Cloud To understand the value of Cisco Fog Data Services, think about high-speed commuter rail systems. Constantly streaming live video over the cellular network would be prohibitively costly. Therefore, most operators store video from onboard video systems on the train, waiting to transmit it until the train arrives at a station with Wi-Fi. If the train derails, however, streaming video over the cellular network becomes worthwhile because passenger safety is at stake. Using Cisco Fog Data Services, the application developers could write a rule stating that if sensors detect hard braking and train tipping, live video should be streamed over the cellular network to the operations center. Management and Automation Depending on the industry and application, fog nodes can number in the hundreds, thousands, or tens of thousands. Automate provisioning and simplify management of your fog nodes using Cisco management applications.
  • 5. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6 Organizations that have field area networks, including utilities and transportation and mining companies, can manage fog nodes using the Cisco Connected Grid Network Management System (CGNMS), which is part of the Cisco Industrial Operations Kit (IOK). Cisco IOK is a one-box solution: a Cisco UCS server with virtualized services, such as virtual router; network management; security; authentication, authorization, and accounting (AAA); zero-touch deployment; a network server; and a self-configuration tool. Virtualized servers and routers reduce upfront deployment and ongoing management costs. And included scripts reduce the time to configure network services from weeks to days. Manufacturers manage their fog nodes using Cisco Prime Infrastructure. Administrators use a single interface to manage the network, fog nodes, applications, and users. You can also deploy your own management and automation tools on Cisco fog nodes, using Cisco IOx APIs. Use Cases Rails Real-time intelligence about conditions and events on trains, trackside, at stations, and the operations center helps you: ● Improve passenger safety: Analyze and correlate data from ruggedized cameras on the trains and at stations. Monitor sensors on wheels and brakes to determine when parts need service before failure causes an accident. Automatically stream video from onboard video surveillance cameras to the operations center if sensors detect a derailed car. ● Thwart cybersecurity attacks on critical operational systems: Then take automated actions such as suspending operations or transferring control to a failover system. ● Alert drivers to treacherous conditions ahead: Fog nodes gather sensor data on tracks and trains to detect unsafe conditions. Drivers are automatically alerted so that they can adjust speed to safe levels. Supervisors also receive alerts if the train is operated in an unsafe manner. ● Increase rider satisfaction: Provide Wi-Fi in rail cars. The access points connect to onboard fog nodes. In addition to providing passenger Wi-Fi, the fog nodes connect with trackside Wi-Fi access nodes to relay real-time information about the various systems on the train. Manufacturing ● Increase agility: Quickly change production lines and introduce new products. Fog nodes can translate instructions from IP to the proprietary industrial protocols used by plant-floor equipment. ● Reduce downtime: Avoid costly equipment downtime by performing predictive maintenance. Fog nodes collect machine data and report early signs of problems. ● Secure machines and data: Analyze data from network devices to detect the earliest signs of network attacks that could threaten personnel or plant safety. ● Authorize access to machines: Before granting access to a machine, verify that the person is who he or she claims to be and is authorized to use that specific machine. ● Continually confirm that safety systems are intact: Analyze machine data that’s transmitted in different formats, in real-time. Shut down compromised equipment automatically, without waiting for a human to respond to an alert. Utilities ● Restore power more quickly: Fog nodes gather data from the power plant, grid, substation, and customer endpoints. They continually analyze the data to identify incipient problems and alert the system operator. ● Detect potential physical security breaches: Ruggedized cameras at remote field substations detect breaches, and also correlate events across multiple locations. ● Detect potential cybersecurity breaches: Automated response helps to prevent infections that could jeopardize safety. ● Reduce maintenance costs and increase system reliability: Fog nodes gather data from critical systems and look for evidence that systems need maintenance. Predictive maintenance helps to prevent outages and can lower costs. Diagnose and solve problems from anywhere. Sensors throughout the system send alerts about power fluctuation, spikes, and other critical events. Why Cisco? Everything You Need and a Broad Selection Only Cisco provides everything you need to develop, host, and manage applications that span from cloud to fog: ● Network connectivity: Choose from many different types of fog nodes, including switches, routers, Cisco UCS servers, and video surveillance cameras. Ruggedized versions are available. ● Security: Secure your fog nodes and data using your existing Cisco physical security and cybersecurity solutions.
  • 6. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6 ● Analytics: Direct data to the right place for analysis, either a fog node or your cloud platform, using Cisco Fog Data Services. The policy can state that latency-sensitive data is to be analyzed on fog nodes. ● Management and automation: Simplify deployment and management of large numbers of fog nodes using Cisco Prime or Cisco CGNMS. ● Application platform: Get innovative with the Internet of Things by using Cisco IOx APIs and Cisco DSX to very rapidly develop fog applications. The same application can run on any Cisco fog node: switch, router, Cisco UCS server, or video surveillance camera. IoT Leadership and Investments Cisco is actively involved in the industry groups developing cloud and fog standards. That means the solutions you get from us reflect the latest thinking and are continually updated to the latest standards. We are also cultivating startups working on promising Fog computing innovations. IoT Ecosystem Partners Our growing ecosystem of partners is developing cloud-to-fog applications for industries such as manufacturing, oil and gas, utilities, transportation, public safety, and local government. Using a commercial application can speed up innovation while saving time and development costs. IoT Services for Your Industry Gain deeper insights into the IoT data you collect in the cloud with Cisco Connected Analytics software portfolio. Use it to view real-time information, spot trends sooner, and make predictions that give you the lead. Supplement this information by engaging Cisco Services for data virtualization, sophisticated data analytics consulting, and data science services. Next Steps Fog computing is here today. It can make your business more agile, faster to respond, and more innovative with IoT. And everything you need is available from one vendor, us. To learn more about the Cisco IoT System, visit www.cisco.com/go/iot. For APIs to develop IoT applications, visit Cisco DevNet: https://developer.cisco.com/iot. Printed in USA C11-734589-00 05/15