SlideShare a Scribd company logo
1 of 15
Download to read offline
AN OVERVIEW ON
EDGE COMPUTING
MD BIDDUT HOSSAIN
e-mail: biddut2j8@gmail.com
HTTP://BIDDUTHOSSAIN.INFO/
LEARNING OBJECTIVE
 In this study, the objective is to find the importance of computation
nearest the user network using edge computation (EC).
 Cloud computing (CC) and its limitations
 Overview of edge computing (EC) and relation on CC and EC.
 Characterized and application of EC
 Technologies used in EC
 Architecture and components of EC
 Challenges and future research
HTTP://BIDDUTHOSSAIN.INFO/
INTRODUCTION
 At present the devices around the world are more connected and moving
to internet-based services. But the communication on multiple devices,
gathering and sharing data across heterogeneous networks, variety of
mechanisms and protocols has an obstacle in the development of internet-
oriented applications.
 This trend creates the concept of Cloud Computing.
http://bidduthossain.info/
CLOUD COMPUTING
 Cloud computing is a set of internet-based computing in which many
remote servers are connected to permit sharing of data-processing tasks,
centralized data storage, and online access to computer services or
resources.
 The emergence of different new computing applications like smart
environments and virtual reality requires the availability of a large pool
of cloud resources and services becoming a limitation for applications
that essentially a real-time response.
http://bidduthossain.info/
LIMITATIONS OF CLOUD COMPUTING
 The cloud computing paradigm is unable to meet the requirements of low
latency, location awareness, and mobility support, real-time services and
data optimization.
 How do overcome this limitation?
 Edge Computing serves this purpose.
 Edge computing is a mini-cloud and interplay with the cloud resources.
 It transfers the utility services hosted in the centralized cloud data center
to decentralized geographical distribution edge network devices.
 Real-time analysis of data at the level of local devices and edge nodes
reduces data flow and operating costs of using cloud services, traffic and
data transfer between the Edge and the cloud.http://bidduthossain.info/
EDGE COMPUTING
 Edge computing (EC) has been emerging as one of the most promising
solutions regarding the cloud limitation, depending on the cooperation of
nodes by moving services directly to end devices and caching
information locally.
 An edge computing paradigm that goals to extend the cloud resources
and services and enable them to be closer the edge of an enterprise’s
network.
 EC is defined by different authors as a set of devices, sensors, computer
resources and computers that generate and collect data that are then sent
to cloud centers.
HTTP://bidduthossain.INFO/
COMPARISON BETWEEN CC AND EC
Edge Cloud
Advantage
Reduce end-user response time
Low latency
Distributed computation
Reduces bandwidth cost,
network traffic and storage.
Scalable
Big data processing
Unlimited storage capacity
Disadvantage
Storage capacity is limited
EC needs proprietary network
Difficult to maintain the
security of data.
Centralized computation
Response time is slow
Generate network traffic
High latency
HTTP://BIDDUTHOSSAIN.INFO/
APPLICATION OF EDGE COMPUTING
 Internet of Things (IoT) smart
environment (Smart building,
Smart surveillance)
 Virtual reality
 Smart traffic, transportation
 Smart health environment
 Industrial automation
 Agriculture
 Online gaming
 Real time big data analysis
HTTP://BIDDUTHOSSAIN.INFO/
STRUCTURE OF EC
 The Figure 1 components are described as
follows:
 Devices and sensors: responsible to
produce and collect data. This group of
devices interacts directly with the end
user (sensors, smart phones, tablets,
smart bracelets or laptops).
 Edge infrastructure: there are
distributed data centers to provide real-
time data processing, data visualization,
analytics, filtering, and optimizing. They
being located closer to end users, they
process, cache storage, and perform
calculations for a large volume of data.
 Cloud: It provides a greater density of
computing, storage, networking
resources. Cloud servers host services for
automatic learning, big data analysis and
business intelligence.
HTTP://BIDDUTHOSSAIN.INFO/
CONSIDERATION ISSUES OF EC
 Reliability (Failure of individual node/ server/ end user, Lack of network
coverage, Failure of edge network and service platform)
 Scalability (Adding a new point of service, Adding new services nodes,
Utilizing cloud interplay)
 Security (Isolation of data paths and memory as multiple users share
edge network, Security of edge devices from malicious users)
 Resource management (Resource allocation, Load balancing,
Monitoring)
 Interoperability (Heterogeneous devices, protocols, and services)
HTTP://BIDDUTHOSSAIN.INFO/
USED TECHNOLOGIES IN EC
 Network functions virtualization
(NFV) can be applied to network
nodes to ensure security and
isolation of user domains.
 Network functions virtualization
(NFV) and Software defined
networking (SDN) are potential
technologies that enable ease of
management of edge resources.
HTTP://BIDDUTHOSSAIN.INFO/
CONCERNING ISSUES OF EC
 Uninterrupted Communication: movement of users from one edge
network to different edge network coverage area interrupts
communication.
 Privacy and Security: As the end user's data computed remotely so the
privacy and security are the major issues of end users.
 Real time data processing: connectivity among many different devices
(sensors, smart phones, tablets, smart bracelets or laptops) creates in a
flood of data production. At real time to compute these data is a major
concern.
 Standardization: Different vendors offer different edge devices as
service providers. Without common standardization it is impossible to
communicate between heterogeneous edge networks.HTTP://BIDDUTHOSSAIN.INFO/
FUTURE RESEARCH ISSUES
 At the internet-based communication data security and response time are
the major concern of users.
 Enhancement security system and ensure maximum utilization of
resources in Edge Computing.
 Develop real time data processing method for load balancing and
increase the performance of EC.
HTTP://BIDDUTHOSSAIN.INFO/
QUESTION
AND
ANSWER
HTTP://BIDDUTHOSSAIN.INFO/
THANKYOU
HTTP://BIDDUTHOSSAIN.INFO/

More Related Content

What's hot

The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
Green cloud computing India
Green cloud computing IndiaGreen cloud computing India
Green cloud computing Indiaakashlaldas
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdffirstlast467690
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Edge Computing Presentation.pptx
Edge Computing Presentation.pptxEdge Computing Presentation.pptx
Edge Computing Presentation.pptxnobita601530
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentationFizaKhan82
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 

What's hot (20)

Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Green cloud computing India
Green cloud computing IndiaGreen cloud computing India
Green cloud computing India
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Edge Computing Presentation.pptx
Edge Computing Presentation.pptxEdge Computing Presentation.pptx
Edge Computing Presentation.pptx
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentation
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 

Similar to Edge computing

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Data Centre Network Optimization
Data Centre Network OptimizationData Centre Network Optimization
Data Centre Network OptimizationIJAEMSJORNAL
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory CouncilDESMOND YUEN
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Machine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxMachine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxssuserf3a100
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfAsiyaKhan63
 

Similar to Edge computing (20)

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Data Centre Network Optimization
Data Centre Network OptimizationData Centre Network Optimization
Data Centre Network Optimization
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
cc.doc
cc.doccc.doc
cc.doc
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Machine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxMachine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdf
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

Recently uploaded

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Edge computing

  • 1. AN OVERVIEW ON EDGE COMPUTING MD BIDDUT HOSSAIN e-mail: biddut2j8@gmail.com HTTP://BIDDUTHOSSAIN.INFO/
  • 2. LEARNING OBJECTIVE  In this study, the objective is to find the importance of computation nearest the user network using edge computation (EC).  Cloud computing (CC) and its limitations  Overview of edge computing (EC) and relation on CC and EC.  Characterized and application of EC  Technologies used in EC  Architecture and components of EC  Challenges and future research HTTP://BIDDUTHOSSAIN.INFO/
  • 3. INTRODUCTION  At present the devices around the world are more connected and moving to internet-based services. But the communication on multiple devices, gathering and sharing data across heterogeneous networks, variety of mechanisms and protocols has an obstacle in the development of internet- oriented applications.  This trend creates the concept of Cloud Computing. http://bidduthossain.info/
  • 4. CLOUD COMPUTING  Cloud computing is a set of internet-based computing in which many remote servers are connected to permit sharing of data-processing tasks, centralized data storage, and online access to computer services or resources.  The emergence of different new computing applications like smart environments and virtual reality requires the availability of a large pool of cloud resources and services becoming a limitation for applications that essentially a real-time response. http://bidduthossain.info/
  • 5. LIMITATIONS OF CLOUD COMPUTING  The cloud computing paradigm is unable to meet the requirements of low latency, location awareness, and mobility support, real-time services and data optimization.  How do overcome this limitation?  Edge Computing serves this purpose.  Edge computing is a mini-cloud and interplay with the cloud resources.  It transfers the utility services hosted in the centralized cloud data center to decentralized geographical distribution edge network devices.  Real-time analysis of data at the level of local devices and edge nodes reduces data flow and operating costs of using cloud services, traffic and data transfer between the Edge and the cloud.http://bidduthossain.info/
  • 6. EDGE COMPUTING  Edge computing (EC) has been emerging as one of the most promising solutions regarding the cloud limitation, depending on the cooperation of nodes by moving services directly to end devices and caching information locally.  An edge computing paradigm that goals to extend the cloud resources and services and enable them to be closer the edge of an enterprise’s network.  EC is defined by different authors as a set of devices, sensors, computer resources and computers that generate and collect data that are then sent to cloud centers. HTTP://bidduthossain.INFO/
  • 7. COMPARISON BETWEEN CC AND EC Edge Cloud Advantage Reduce end-user response time Low latency Distributed computation Reduces bandwidth cost, network traffic and storage. Scalable Big data processing Unlimited storage capacity Disadvantage Storage capacity is limited EC needs proprietary network Difficult to maintain the security of data. Centralized computation Response time is slow Generate network traffic High latency HTTP://BIDDUTHOSSAIN.INFO/
  • 8. APPLICATION OF EDGE COMPUTING  Internet of Things (IoT) smart environment (Smart building, Smart surveillance)  Virtual reality  Smart traffic, transportation  Smart health environment  Industrial automation  Agriculture  Online gaming  Real time big data analysis HTTP://BIDDUTHOSSAIN.INFO/
  • 9. STRUCTURE OF EC  The Figure 1 components are described as follows:  Devices and sensors: responsible to produce and collect data. This group of devices interacts directly with the end user (sensors, smart phones, tablets, smart bracelets or laptops).  Edge infrastructure: there are distributed data centers to provide real- time data processing, data visualization, analytics, filtering, and optimizing. They being located closer to end users, they process, cache storage, and perform calculations for a large volume of data.  Cloud: It provides a greater density of computing, storage, networking resources. Cloud servers host services for automatic learning, big data analysis and business intelligence. HTTP://BIDDUTHOSSAIN.INFO/
  • 10. CONSIDERATION ISSUES OF EC  Reliability (Failure of individual node/ server/ end user, Lack of network coverage, Failure of edge network and service platform)  Scalability (Adding a new point of service, Adding new services nodes, Utilizing cloud interplay)  Security (Isolation of data paths and memory as multiple users share edge network, Security of edge devices from malicious users)  Resource management (Resource allocation, Load balancing, Monitoring)  Interoperability (Heterogeneous devices, protocols, and services) HTTP://BIDDUTHOSSAIN.INFO/
  • 11. USED TECHNOLOGIES IN EC  Network functions virtualization (NFV) can be applied to network nodes to ensure security and isolation of user domains.  Network functions virtualization (NFV) and Software defined networking (SDN) are potential technologies that enable ease of management of edge resources. HTTP://BIDDUTHOSSAIN.INFO/
  • 12. CONCERNING ISSUES OF EC  Uninterrupted Communication: movement of users from one edge network to different edge network coverage area interrupts communication.  Privacy and Security: As the end user's data computed remotely so the privacy and security are the major issues of end users.  Real time data processing: connectivity among many different devices (sensors, smart phones, tablets, smart bracelets or laptops) creates in a flood of data production. At real time to compute these data is a major concern.  Standardization: Different vendors offer different edge devices as service providers. Without common standardization it is impossible to communicate between heterogeneous edge networks.HTTP://BIDDUTHOSSAIN.INFO/
  • 13. FUTURE RESEARCH ISSUES  At the internet-based communication data security and response time are the major concern of users.  Enhancement security system and ensure maximum utilization of resources in Edge Computing.  Develop real time data processing method for load balancing and increase the performance of EC. HTTP://BIDDUTHOSSAIN.INFO/