0% found this document useful (0 votes)
106 views

Presented By-Arpan Manna (115/CSC/191028) Guided by - Taniya Seal Presented by - Arpan Manna (115/CSC/191028) Guided by - Taniya Seal

This document discusses edge computing. It defines edge computing as a decentralized computing system that processes data near where it is generated, such as on smart devices, rather than sending all data to centralized cloud servers. This reduces latency and network usage. The document outlines edge computing terms and architecture, how edge computing benefits IoT applications, its advantages over cloud computing, security considerations, and examples of edge computing use cases.

Uploaded by

Arpan Manna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views

Presented By-Arpan Manna (115/CSC/191028) Guided by - Taniya Seal Presented by - Arpan Manna (115/CSC/191028) Guided by - Taniya Seal

This document discusses edge computing. It defines edge computing as a decentralized computing system that processes data near where it is generated, such as on smart devices, rather than sending all data to centralized cloud servers. This reduces latency and network usage. The document outlines edge computing terms and architecture, how edge computing benefits IoT applications, its advantages over cloud computing, security considerations, and examples of edge computing use cases.

Uploaded by

Arpan Manna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Presented By- Arpan

esented By- Arpan Manna(115/CSC/191028)


anna(115/CSC/191028) Guided By- Taniya Seal
30/07/2021
uided By- Taniya Seal
Contents
 What is Edge Computing
 Overview Of Edge Computing
 What exactly is Edge Computing
 Why is Edge Computing is Important
 Edge Computing terms & Definitation
 Edge Computing Architecture
 IoT & Edge Computing
 Benefits Of Edge Computing
 Comparison Between Cloud Computing & Edge Computing
 Security in Edge Computing
 Use Of Edge Computing
 References
Overview of Edge Computing

 Edge Computing is a decentralized computing system in which processing and


computation are performed mainly on classified device nodes known as smart devices
or edge devices as opposed to processed in a centralized cloud environment or data
centers.
 It helps to provide server resources, data analysis, and artificial intelligence to data
collection sources and cyber-physical sources like smart sensors and actuators.
What exactly is Edge Computing?

 In the beginning, there was One Big Computer. Then, in the Unix era, we learned how to connect to that
computer using dumb (not a pejorative) terminals. Next we had personal computers, which was the first time
regular people really owned the hardware that did the work.
 Typically in IoT use cases, a massive chunk of data goes through the data center, but edge computing
processes the data locally results in reduced traffic in the central repository.
 This is done by IoT devices, transferring the data to the local device, which includes storage, compute, and
network connectivity.
 After that, data is processed at the edge while another portion is sent to storage repository or central
processing in the data center.
Why is Edge Computing Important?

 New Functionalities are offered.


 Easier configurations.
 Hacking Potential is increased.
 The load on the server is reduced.
 Load on Network is reduced.
 Application Programming Interface.
 Increases Extensibility.
 Centralized Management.
 Costs of Licensing.
 Support and Updates.
Edge Computing Terms and Definitions

Edge
The word edge in this context means literal geographic distribution. Edge
computing is computing that’s done at or near the source of the data, instead of
relying on the cloud at one of a dozen data centres to do all the work. It doesn’t
mean the cloud will disappear. It means the cloud is coming to you.
Edge Devices
A device which produces data is edge devices like machines and sensors, or any
devices through which information is collected and delivered.
Edge Gateway
 It’s a buffer where edge computing processing is done.
 The gateway is the window into the environment beyond the edge of the network.

Fat Client
It’s a software that processes data in edge devices, which is opposite to thin client, which hardly transfers data.

Edge Computing Equipment


 Devices like sensors and machines can be outfitted to work in edge computing.
 Environments by making the internet accessible.

Mobile Edge Computing


It signifies the growth of edge computing systems in telecommunication systems like 5G scenarios.
Edge Computing Architecture

• Cloud Modules Cloud


• Legacy Cloud Apps
• Edge Run time
• Cognitive, Storage, Analytics
• Edge Modules Gateway
• Gateway Services
Internet of Things (IoT) and Edge
Computing

There are various scenarios where speed and high-speed data are the
main components for management, power issues, analytics, and real-
time need, etc. helps to process data with edge computing in IoT.
Benefits of Enabling Edge Computing for
the Internet of Things (IoT)

 Lesser Network Load


 Zero Latency
 Reduced Data Exposure
 Computational Efficient
 Costs and Autonomous Operation
 Security and Privacy
Advantages of Enabling Edge Computing

 Speed is increased.
 Reliability is increased.
 The random issue is reduced.
 The compliance issue is reduced.
 Hacking issues are reduced.
 Random issues are reduced.
 Instant Scalability.
 Automated updates.
 Collaboration with cloud.
Edge Computing vs. Cloud Computing
Security in Edge Computing
 There are two sides of security in edge computing –

 One of them is that the security in edge computing is better than any other part of the data storage
application because data is not traveling over the network; it stays where it is created.

 The flip side of it is that security in edge computing is less secure because the edge devices in themselves
can be more vulnerable.

 In conclusion, data encryption, access control, and the use of virtual private networks are crucial elements to
protect the edge computing system.
Use of Edge Computing

 Smart applications and devices respond to data, instantly eliminating lag time.
 Real-time data process with any latency where even milliseconds in latency make a
difference in the processing of data.
 Acceleration in the data stream.
 Efficient data processing in massive data.
 Effective use of the application in a remote location.
 Security for sensitive data even without putting in the public cloud.
References

 https://en.wikipedia.org/wiki/Edge_computing
 https://www.perthorn.com/why-is-everyone-talking-about-edge-computing/
 https://whataftercollege.com/internet-of-things/different-types-of-edge-computing/
 https://www.dqindia.com/evolution-edge-computing/
 http://elijah.cs.cmu.edu/DOCS/satya-edge2016.pdf

You might also like