SlideShare a Scribd company logo
EDGE computing and it’s role in architecting IoT
K. K. PATTANAIK
Wireless Sensor Networks laboratory
Atal Bihari Vajpayee –
Indian Institute of Information Technology and Management,
Gwalior
kkpatnaik@iiitm.ac.in
Administration block
Academic block
Convention center
Open air theatre
Auditorium
Class room
Library
Class room
Spots arena
Swimming pool
Dispensary
Faculty residence
Academic programs offered
• 4 year BTech in CSE (started in 2017)
• 5 year Integrated Post Graduate in IT
• 5 year Integrated Post Graduate in MBA
• 2 year Mtech in CN, IS, DC, VLSI
• PhD
Figure: PDP loop explaining the ways in which Industry 4.0 might benefit
customers. Adapted from Center for Integrated Research, Deloitte US, 2018
• Shift from “linear data and
communications” to “real time
access to data and
intelligence” driven by the
continuous and cyclical flow
of information and actions
between the physical and
digital worlds
• Decentralization of digital
entities onto edge nodes
towards a modular structure of
MES
• Interoperability among digital
entities and execution of
sophisticated algorithms on
edge nodes.
Edge computing in Industry 4.0
Example on improving the availability of the
machine
Figure: OE without an adaptive mechanism Figure: OE as a consequence of adaptive mechanism
• Identification of “beginning of deterioration” and the “rate of deterioration” in OE of machine
is necessary to mitigate the unscheduled down state.
• Sophisticated algorithms at edge nodes to signal the deterioration and adaptively control the workload
will defer early breakdown and enhance average AOE
AOE =
𝐴𝑐𝑡𝑢𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡
𝐼𝑑𝑒𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡
Case of improving the average Absolute Operational Efficiency (AOE) of machine through edge intelligence
Visualizing Edge – An Introduction
Figure: Edge seen at different levels of granularity in an industry
• The Edge computing realm:
• Equipment protection
• Overall equipment effectiveness
monitoring
• Optimizing supply chain processes
• Predictive maintenance
• Improved performance: Alerts, analysis,
robustness, reliability, autonomous, resilient,
enhanced uptime
• Privacy and security: Data kept close to its
generation
• Reduced operational cost: Due to reduced data
migration, bandwidth, savings from cloud
spending
Visualizing Edge – An Introduction (continued)
• The in-device computing capability in real-time helps in
improving performances through embedded intelligence
in devices
• Huge IoT data generated is exploited at Edge
• Ratio of amount of data generated by all sensors to the
data used for decision is high
Edge Computing
Space
Cloud computing
Space
Low latency, increased privacy, less cost, real time processing,
relatively less processing capability, faster insights and actions,
improved response time, improved BW availability.
Visualizing Edge – An Introduction (continued)
Edge Computing
Space
Cloud computing
Space
Low latency, increased privacy,
less cost, real time processing,
relatively less processing capability,
faster insights and actions,
improved response time,
improved BW availability.
Abstract view of Edge paradigm
Source: IONOS Inc.
Source: IoT World Today
Figure: Layered view referenced to ISA 95 standard
Layered view of the ecosystem
Edge computing – Use cases
• Banks analyze ATM video feeds in real-time
• Mining companies use their data to optimize operations
• Chemical industries analyze the workers’ exposure trend to
harmful chemicals/gases
• Retailers can personalize the shopping experience of
customers and communicate specialized offers
• Industrial analytics
• Fleet management application
• Product traceability application
• Connected elevators to monitor the elevators’ health
• Cobots (collaborative robots) etc.
Data pro-sumers
• Data is both produced and consumed by us
• Traditionally all our data is placed on public/private cloud
and process them (term it as workload) on cloud
Cloud infrastructure
(Public/private)
Service providers
Network infrastructure
Service providers
Factory/workplace
(Data pro-summers)
Place workload as close to the place where the data is being produced
and action is being taken.
Data processing approaches
Figure: Classification of data processing mechanisms for IoT sensory environment.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications,
Volume 130, 2019, Pages 89-103.
Non-message exchange based in-network data processing
Figure: Taxonomy of outlier detection techniques in wireless sensor networks.
Source: Bharti, S et al., (2016), Gravitational outlier detection for wireless sensor networks. Int. J. Commun. Syst. 29 (13), 2015–2027
Message exchange based in-network data processing
Figure: InContextIoT system architecture.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer
Applications, Volume 130, 2019, Pages 89-103.
Message exchange based in-network data processing
Figure: InContextIoT system architecture.
Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and
Computer Applications, Volume 130, 2019, Pages 89-103.
Ex: high temperature, low humidity, high
luminosity, and presence of CO are the
LLCs acquired by annotating and tagging
the raw sensor data
LLCs are processed to infer HLC
Moving the process of the HLCs inference inside the
network and closer to the RoI of queries as against
the current approaches of centralized processing.
Edge server and edge devices
Edge compute capacity
(place where workload can be processed)
Edge server: A piece of IT
Equipment for processing IT
workload. It has relatively
higher processing abilities
Edge devices: A piece of IT
Equipment built for some purpose.
Ex: Assembling machine,
robot, car, quality check,
health of critical machine
Components etc.
The various computing spaces
Connect
and
manage
Many
edge
devices
How to manage workloads in these computing spaces?
• Reflection Questions:
How to manage a huge number of workloads in these diverse
compute spaces!
• Containerization
• Management of containers
• Security aspect etc.
Computing spaces
Edge devices’
Computing
space
Edge server
Computing space
Cloud computing
space
150+ billion edge devices by 2025
Computation will moved to edge
Enabling network protocols for edge computing
Low power, Low data, Short-range wireless mesh
network wireless standards
Z-Wave
ZigBee
Bluetooth LE
6LoWPAN
Industrial automation uses RS485 communication
protocol/PLC to monitor the device with Modbus
communication
Modbus
ONVIF
Open Network Video Interface Forum defines Interfaces
of physical IP-based security products for communication
Enabling network protocols for edge computing (continued)
SoC based self powered applications for the IoT
EnOcean
Open Platform Communications United Architecture is a
data exchange standard for industrial communication. It is
independent of the manufacturer of the application,
programming language, and the execution environment.
BACnet Building Automation and Control Networks used
to manage heating, ventilating, air-conditioning,
refrigerating, lighting, fire control, and alarm
systems.
OPC UA
The Long Range is a low power, networking protocol
designed to interoperate seamlessly between end devices
and the Internet in wireless manner
LoRa
Application layer protocols for gateway communication
To allow remote applications to communicate with the gateway
• MQTT: Message Queuing Telemetry Transport based on publish-subscribe
architecture
• AMQP: Advanced Message Queuing Protocol
• CoAP: Constrained Application Protocol, a web transfer protocol for IoT
• REST: Representational State Transfer architectural style for IoT atop
application layer
• WebSockets: A low-latency, full-duplex, persistent protocol that allows
the server to update the client application without an initiating request
from the client.
• JSON-RPC: A RPC protocol for microservices that allows clients to push
data/multiple calls to be sent to the server which need not be answered
in order.
What we are working on!
Figure: AgriCPS architecture
Source: Sapna et al., (2020), A dynamic distributed boundary node detection algorithm for management zone delineation in Precision Agriculture,
Journal of Network and Computer Applications, Volume 167
Figure: Distributed lightweight data acquisition protocol for VRI
What we are working on! (continued)
What we are working on! (continued)
• Edge server placement schemes to minimize edge device to server
communication cost
• Split learning in edge-cloud collaboration for predictive maintenance
• Optimizing communication cost for interactive IoT sensory environments
• Workload offloading in multi-access edge computing
Contributions of all the PhD scholars of Wireless Sensor Networks laboratory at ABV-
IIITM Gwalior is appreciated and duly acknowledged.
Connecting stuff: The IoT reference model
Source: http://cdn.iotwf.com/resources/72/IoT_Reference_Model_04_June_2014.pdf
Source: https://www.altexsoft.com/blog/iot-architecture-layers-components/
THANK YOU

More Related Content

What's hot

Arpan pal icdcn
Arpan pal icdcnArpan pal icdcn
Arpan pal icdcn
Arpan Pal
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Mark Goldstein
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
vishal choudhary
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
CHAKER ALLAOUI
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
Shah Sheikh
 
Fog computing
Fog computingFog computing
Fog computing
Hadi Fadlallah
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iot
Dev Bhattacharya
 
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
International Journal of Technical Research & Application
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
vishal choudhary
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
vishal choudhary
 
Internet of Things Scalability
Internet of Things ScalabilityInternet of Things Scalability
Internet of Things Scalability
rrrighi
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
Lippo Group Digital
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksDr. Fahad Aijaz
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
ijtsrd
 
Internet of things
Internet of thingsInternet of things
Internet of things
Satish Chavan
 

What's hot (19)

Arpan pal icdcn
Arpan pal icdcnArpan pal icdcn
Arpan pal icdcn
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
Fog computing
Fog computingFog computing
Fog computing
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iot
 
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Internet of Things Scalability
Internet of Things ScalabilityInternet of Things Scalability
Internet of Things Scalability
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor Networks
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to Edge computing and its role in architecting IoT

IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
vijayalaxmipatil2002
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
ANANDHUPILLAI1
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
SachuS16
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
PriyaMaurya52
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
RahulJain989779
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of Things
HarshitParkar6677
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
Mostafa Arjmand
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdfWeek 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
MohamedAli899919
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
Edge computing
Edge computing Edge computing
Edge computing
RishiPrasath2
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
suthi
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
Fame22
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
Manikandan Kandasamy
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
drth5
 
Edge comp
Edge compEdge comp
Edge comp
mahendra665237
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
Cerebrum Infotech
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
Cognizant
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
Milanap1
 

Similar to Edge computing and its role in architecting IoT (20)

IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of Things
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdfWeek 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Edge computing
Edge computing Edge computing
Edge computing
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptxCHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
CHAPTER 1-Introduction of Advanced Network Technology and Facilities.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge comp
Edge compEdge comp
Edge comp
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Edge computing and its role in architecting IoT

  • 1. EDGE computing and it’s role in architecting IoT K. K. PATTANAIK Wireless Sensor Networks laboratory Atal Bihari Vajpayee – Indian Institute of Information Technology and Management, Gwalior kkpatnaik@iiitm.ac.in
  • 2. Administration block Academic block Convention center Open air theatre Auditorium Class room Library Class room Spots arena Swimming pool Dispensary Faculty residence
  • 3. Academic programs offered • 4 year BTech in CSE (started in 2017) • 5 year Integrated Post Graduate in IT • 5 year Integrated Post Graduate in MBA • 2 year Mtech in CN, IS, DC, VLSI • PhD
  • 4. Figure: PDP loop explaining the ways in which Industry 4.0 might benefit customers. Adapted from Center for Integrated Research, Deloitte US, 2018 • Shift from “linear data and communications” to “real time access to data and intelligence” driven by the continuous and cyclical flow of information and actions between the physical and digital worlds • Decentralization of digital entities onto edge nodes towards a modular structure of MES • Interoperability among digital entities and execution of sophisticated algorithms on edge nodes. Edge computing in Industry 4.0
  • 5. Example on improving the availability of the machine Figure: OE without an adaptive mechanism Figure: OE as a consequence of adaptive mechanism • Identification of “beginning of deterioration” and the “rate of deterioration” in OE of machine is necessary to mitigate the unscheduled down state. • Sophisticated algorithms at edge nodes to signal the deterioration and adaptively control the workload will defer early breakdown and enhance average AOE AOE = 𝐴𝑐𝑡𝑢𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡 𝐼𝑑𝑒𝑎𝑙 𝑡ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡 Case of improving the average Absolute Operational Efficiency (AOE) of machine through edge intelligence
  • 6. Visualizing Edge – An Introduction Figure: Edge seen at different levels of granularity in an industry • The Edge computing realm: • Equipment protection • Overall equipment effectiveness monitoring • Optimizing supply chain processes • Predictive maintenance • Improved performance: Alerts, analysis, robustness, reliability, autonomous, resilient, enhanced uptime • Privacy and security: Data kept close to its generation • Reduced operational cost: Due to reduced data migration, bandwidth, savings from cloud spending
  • 7. Visualizing Edge – An Introduction (continued) • The in-device computing capability in real-time helps in improving performances through embedded intelligence in devices • Huge IoT data generated is exploited at Edge • Ratio of amount of data generated by all sensors to the data used for decision is high Edge Computing Space Cloud computing Space Low latency, increased privacy, less cost, real time processing, relatively less processing capability, faster insights and actions, improved response time, improved BW availability.
  • 8. Visualizing Edge – An Introduction (continued) Edge Computing Space Cloud computing Space Low latency, increased privacy, less cost, real time processing, relatively less processing capability, faster insights and actions, improved response time, improved BW availability.
  • 9. Abstract view of Edge paradigm Source: IONOS Inc. Source: IoT World Today
  • 10. Figure: Layered view referenced to ISA 95 standard Layered view of the ecosystem
  • 11. Edge computing – Use cases • Banks analyze ATM video feeds in real-time • Mining companies use their data to optimize operations • Chemical industries analyze the workers’ exposure trend to harmful chemicals/gases • Retailers can personalize the shopping experience of customers and communicate specialized offers • Industrial analytics • Fleet management application • Product traceability application • Connected elevators to monitor the elevators’ health • Cobots (collaborative robots) etc.
  • 12. Data pro-sumers • Data is both produced and consumed by us • Traditionally all our data is placed on public/private cloud and process them (term it as workload) on cloud Cloud infrastructure (Public/private) Service providers Network infrastructure Service providers Factory/workplace (Data pro-summers) Place workload as close to the place where the data is being produced and action is being taken.
  • 13. Data processing approaches Figure: Classification of data processing mechanisms for IoT sensory environment. Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications, Volume 130, 2019, Pages 89-103.
  • 14. Non-message exchange based in-network data processing Figure: Taxonomy of outlier detection techniques in wireless sensor networks. Source: Bharti, S et al., (2016), Gravitational outlier detection for wireless sensor networks. Int. J. Commun. Syst. 29 (13), 2015–2027
  • 15. Message exchange based in-network data processing Figure: InContextIoT system architecture. Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications, Volume 130, 2019, Pages 89-103.
  • 16. Message exchange based in-network data processing Figure: InContextIoT system architecture. Source: R K Verma et al., (2019), In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications, Volume 130, 2019, Pages 89-103. Ex: high temperature, low humidity, high luminosity, and presence of CO are the LLCs acquired by annotating and tagging the raw sensor data LLCs are processed to infer HLC Moving the process of the HLCs inference inside the network and closer to the RoI of queries as against the current approaches of centralized processing.
  • 17. Edge server and edge devices Edge compute capacity (place where workload can be processed) Edge server: A piece of IT Equipment for processing IT workload. It has relatively higher processing abilities Edge devices: A piece of IT Equipment built for some purpose. Ex: Assembling machine, robot, car, quality check, health of critical machine Components etc.
  • 18. The various computing spaces Connect and manage Many edge devices
  • 19. How to manage workloads in these computing spaces? • Reflection Questions: How to manage a huge number of workloads in these diverse compute spaces! • Containerization • Management of containers • Security aspect etc. Computing spaces Edge devices’ Computing space Edge server Computing space Cloud computing space 150+ billion edge devices by 2025 Computation will moved to edge
  • 20. Enabling network protocols for edge computing Low power, Low data, Short-range wireless mesh network wireless standards Z-Wave ZigBee Bluetooth LE 6LoWPAN Industrial automation uses RS485 communication protocol/PLC to monitor the device with Modbus communication Modbus ONVIF Open Network Video Interface Forum defines Interfaces of physical IP-based security products for communication
  • 21. Enabling network protocols for edge computing (continued) SoC based self powered applications for the IoT EnOcean Open Platform Communications United Architecture is a data exchange standard for industrial communication. It is independent of the manufacturer of the application, programming language, and the execution environment. BACnet Building Automation and Control Networks used to manage heating, ventilating, air-conditioning, refrigerating, lighting, fire control, and alarm systems. OPC UA The Long Range is a low power, networking protocol designed to interoperate seamlessly between end devices and the Internet in wireless manner LoRa
  • 22. Application layer protocols for gateway communication To allow remote applications to communicate with the gateway • MQTT: Message Queuing Telemetry Transport based on publish-subscribe architecture • AMQP: Advanced Message Queuing Protocol • CoAP: Constrained Application Protocol, a web transfer protocol for IoT • REST: Representational State Transfer architectural style for IoT atop application layer • WebSockets: A low-latency, full-duplex, persistent protocol that allows the server to update the client application without an initiating request from the client. • JSON-RPC: A RPC protocol for microservices that allows clients to push data/multiple calls to be sent to the server which need not be answered in order.
  • 23. What we are working on! Figure: AgriCPS architecture Source: Sapna et al., (2020), A dynamic distributed boundary node detection algorithm for management zone delineation in Precision Agriculture, Journal of Network and Computer Applications, Volume 167
  • 24. Figure: Distributed lightweight data acquisition protocol for VRI What we are working on! (continued)
  • 25. What we are working on! (continued) • Edge server placement schemes to minimize edge device to server communication cost • Split learning in edge-cloud collaboration for predictive maintenance • Optimizing communication cost for interactive IoT sensory environments • Workload offloading in multi-access edge computing Contributions of all the PhD scholars of Wireless Sensor Networks laboratory at ABV- IIITM Gwalior is appreciated and duly acknowledged.
  • 26. Connecting stuff: The IoT reference model Source: http://cdn.iotwf.com/resources/72/IoT_Reference_Model_04_June_2014.pdf Source: https://www.altexsoft.com/blog/iot-architecture-layers-components/