Group 12 - Edge Computing
Group 12 - Edge Computing
Edge Computing
A DISTRIBUTED COMPUTING PARADIGM
PRESENTED BY :
Kriti Prasad (MCom ACCA)
Anuradha Agarwal (MCom ACCA)
Tejaswini M R (MCom ACCA)
Nivritti Yumkhaibam (MCom ACCA)
Agenda
KEY TOPICS DISCUSSED IN
THIS PRESENTATION
ADVANTAGES 2. Speed
OF EDGE
Edge computing's most significant advantage is the potential to
improve network productivity by minimizing the latency. The data they
accumulate does not have to move almost as far as it would under
COMPUTING such a conventional cloud environment, since IoT edge computing
devices manage private data or in neighboring edge data centers.
3. Performance Improvement
Edge computing also collects, analyzes, and conducts appropriate
actions on the gathered data locally, in addition to collecting data for
transfer to the cloud. Although these activities have been completed
in milliseconds, no matter what all the operations might be, it is
becoming important to optimize technical information.
4. Reducing Operational Costs
Communication, data management, throughput, and performance
features are surprisingly costly in the cloud computing model. Edge
computing, which has a substantially lower bandwidth demand and
less bandwidth, remedies this inefficiency.
5. Scalability
ADVANTAGES
The companies can't always predict their IT infrastructure
requirements as businesses expand, and constructing a specialized
OF EDGE
private cloud is an unnecessary expense. There is also the problem of
tomorrow 's requirements, in contrast to the considerable up-front
COMPUTING
building costs and ongoing maintenance. Conventional private
facilities impose an artificial restriction on growth, locking businesses
into predictions of their future computing requirements.
7. Versatility
Edge computing's interoperability also makes it extremely flexible.
Businesses can quickly reach competitive markets without continuing
to spend in costly infrastructure investment by collaborating with local
edge data centers.
1.) Power supply
Technically, edge computing can process data at any location on
the planet because it doesn’t require an Internet connection.
However, practically, this concept is often made impossible by the
lack of power supply.
2.) Space
DISADVANTAGES Local networks require hardware to function. This poses the first
problem: not all companies have physical space to store servers. If
OF EDGE
there aren’t enough local servers, the edge computing will not be able
to accommodate a lot of data.
4.) Security
Technically, edge computing can be a lot more secure than cloud
computing because you don’t have to entrust sensitive information to
the third-party provider. In reality, this is only possible if the
enterprise invests in securing its local network.
Edge computing combined with other technologies
Edge integrates centralized and distributed architectures. Cloud
and the edge work hand in hand to enable new experiences. Data
is generated or collected in many locations and then moved to
the cloud, where computing is centralized, making it easier and
cheaper to process data together in one place and at scale. Edge
computing uses locally generated data to enable real-time
responsiveness to create new experiences, while at the same
time controlling sensitive data and reducing costs of data
transmission to the cloud. Edge reduces latency, meaning it
lowers response time by doing the work close to the source
instead of sending it to the more distant cloud and then waiting
for a response.
Cloud Computing Edge Computing
Clouds are places where data can be stored or Edges are also places where data is collected.
applications can run. They are software- They are physical environments made up of
defined environments created by data centres hardware outside a data centre.
or server farms. Edge computing is also an act; act of running
Cloud computing is an act; act of running workloads on edge devices.
workloads in a cloud. Edge computing is used to process time-sensitive
cloud computing is used to process data that is data.
not time-driven. Edge Computing needs a comprehensive security
It needs less of a comprehensive protection strategy that involves sophisticated
plan. authentication mechanisms and effective attack
handling.
THANK YOU FOR VIEWING THE
PRESENTATION