SlideShare a Scribd company logo
1 of 15
Download to read offline
AN OVERVIEW ON
EDGE COMPUTING
MD BIDDUT HOSSAIN
e-mail: biddut2j8@gmail.com
HTTP://BIDDUTHOSSAIN.INFO/
LEARNING OBJECTIVE
 In this study, the objective is to find the importance of computation
nearest the user network using edge computation (EC).
 Cloud computing (CC) and its limitations
 Overview of edge computing (EC) and relation on CC and EC.
 Characterized and application of EC
 Technologies used in EC
 Architecture and components of EC
 Challenges and future research
HTTP://BIDDUTHOSSAIN.INFO/
INTRODUCTION
 At present the devices around the world are more connected and moving
to internet-based services. But the communication on multiple devices,
gathering and sharing data across heterogeneous networks, variety of
mechanisms and protocols has an obstacle in the development of internet-
oriented applications.
 This trend creates the concept of Cloud Computing.
http://bidduthossain.info/
CLOUD COMPUTING
 Cloud computing is a set of internet-based computing in which many
remote servers are connected to permit sharing of data-processing tasks,
centralized data storage, and online access to computer services or
resources.
 The emergence of different new computing applications like smart
environments and virtual reality requires the availability of a large pool
of cloud resources and services becoming a limitation for applications
that essentially a real-time response.
http://bidduthossain.info/
LIMITATIONS OF CLOUD COMPUTING
 The cloud computing paradigm is unable to meet the requirements of low
latency, location awareness, and mobility support, real-time services and
data optimization.
 How do overcome this limitation?
 Edge Computing serves this purpose.
 Edge computing is a mini-cloud and interplay with the cloud resources.
 It transfers the utility services hosted in the centralized cloud data center
to decentralized geographical distribution edge network devices.
 Real-time analysis of data at the level of local devices and edge nodes
reduces data flow and operating costs of using cloud services, traffic and
data transfer between the Edge and the cloud.http://bidduthossain.info/
EDGE COMPUTING
 Edge computing (EC) has been emerging as one of the most promising
solutions regarding the cloud limitation, depending on the cooperation of
nodes by moving services directly to end devices and caching
information locally.
 An edge computing paradigm that goals to extend the cloud resources
and services and enable them to be closer the edge of an enterprise’s
network.
 EC is defined by different authors as a set of devices, sensors, computer
resources and computers that generate and collect data that are then sent
to cloud centers.
HTTP://bidduthossain.INFO/
COMPARISON BETWEEN CC AND EC
Edge Cloud
Advantage
Reduce end-user response time
Low latency
Distributed computation
Reduces bandwidth cost,
network traffic and storage.
Scalable
Big data processing
Unlimited storage capacity
Disadvantage
Storage capacity is limited
EC needs proprietary network
Difficult to maintain the
security of data.
Centralized computation
Response time is slow
Generate network traffic
High latency
HTTP://BIDDUTHOSSAIN.INFO/
APPLICATION OF EDGE COMPUTING
 Internet of Things (IoT) smart
environment (Smart building,
Smart surveillance)
 Virtual reality
 Smart traffic, transportation
 Smart health environment
 Industrial automation
 Agriculture
 Online gaming
 Real time big data analysis
HTTP://BIDDUTHOSSAIN.INFO/
STRUCTURE OF EC
 The Figure 1 components are described as
follows:
 Devices and sensors: responsible to
produce and collect data. This group of
devices interacts directly with the end
user (sensors, smart phones, tablets,
smart bracelets or laptops).
 Edge infrastructure: there are
distributed data centers to provide real-
time data processing, data visualization,
analytics, filtering, and optimizing. They
being located closer to end users, they
process, cache storage, and perform
calculations for a large volume of data.
 Cloud: It provides a greater density of
computing, storage, networking
resources. Cloud servers host services for
automatic learning, big data analysis and
business intelligence.
HTTP://BIDDUTHOSSAIN.INFO/
CONSIDERATION ISSUES OF EC
 Reliability (Failure of individual node/ server/ end user, Lack of network
coverage, Failure of edge network and service platform)
 Scalability (Adding a new point of service, Adding new services nodes,
Utilizing cloud interplay)
 Security (Isolation of data paths and memory as multiple users share
edge network, Security of edge devices from malicious users)
 Resource management (Resource allocation, Load balancing,
Monitoring)
 Interoperability (Heterogeneous devices, protocols, and services)
HTTP://BIDDUTHOSSAIN.INFO/
USED TECHNOLOGIES IN EC
 Network functions virtualization
(NFV) can be applied to network
nodes to ensure security and
isolation of user domains.
 Network functions virtualization
(NFV) and Software defined
networking (SDN) are potential
technologies that enable ease of
management of edge resources.
HTTP://BIDDUTHOSSAIN.INFO/
CONCERNING ISSUES OF EC
 Uninterrupted Communication: movement of users from one edge
network to different edge network coverage area interrupts
communication.
 Privacy and Security: As the end user's data computed remotely so the
privacy and security are the major issues of end users.
 Real time data processing: connectivity among many different devices
(sensors, smart phones, tablets, smart bracelets or laptops) creates in a
flood of data production. At real time to compute these data is a major
concern.
 Standardization: Different vendors offer different edge devices as
service providers. Without common standardization it is impossible to
communicate between heterogeneous edge networks.HTTP://BIDDUTHOSSAIN.INFO/
FUTURE RESEARCH ISSUES
 At the internet-based communication data security and response time are
the major concern of users.
 Enhancement security system and ensure maximum utilization of
resources in Edge Computing.
 Develop real time data processing method for load balancing and
increase the performance of EC.
HTTP://BIDDUTHOSSAIN.INFO/
QUESTION
AND
ANSWER
HTTP://BIDDUTHOSSAIN.INFO/
THANKYOU
HTTP://BIDDUTHOSSAIN.INFO/

More Related Content

What's hot

Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingRamneek Kalra
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouMegan O'Keefe
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingCygnet Infotech
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentationFizaKhan82
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providersVineet Garg
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud ComputingRajshri Mohan
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 

What's hot (20)

Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentation
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Edge Computing
Edge Computing Edge Computing
Edge Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 

Similar to Edge computing

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Data Centre Network Optimization
Data Centre Network OptimizationData Centre Network Optimization
Data Centre Network OptimizationIJAEMSJORNAL
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory CouncilDESMOND YUEN
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Machine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxMachine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxssuserf3a100
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfAsiyaKhan63
 

Similar to Edge computing (20)

HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Data Centre Network Optimization
Data Centre Network OptimizationData Centre Network Optimization
Data Centre Network Optimization
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
cc.doc
cc.doccc.doc
cc.doc
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Machine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptxMachine Learning for Multimedia and Edge Information Processing.pptx
Machine Learning for Multimedia and Edge Information Processing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
sensors-22-00196-v2.pdf
sensors-22-00196-v2.pdfsensors-22-00196-v2.pdf
sensors-22-00196-v2.pdf
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 

Recently uploaded

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 

Recently uploaded (9)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 

Edge computing

  • 1. AN OVERVIEW ON EDGE COMPUTING MD BIDDUT HOSSAIN e-mail: biddut2j8@gmail.com HTTP://BIDDUTHOSSAIN.INFO/
  • 2. LEARNING OBJECTIVE  In this study, the objective is to find the importance of computation nearest the user network using edge computation (EC).  Cloud computing (CC) and its limitations  Overview of edge computing (EC) and relation on CC and EC.  Characterized and application of EC  Technologies used in EC  Architecture and components of EC  Challenges and future research HTTP://BIDDUTHOSSAIN.INFO/
  • 3. INTRODUCTION  At present the devices around the world are more connected and moving to internet-based services. But the communication on multiple devices, gathering and sharing data across heterogeneous networks, variety of mechanisms and protocols has an obstacle in the development of internet- oriented applications.  This trend creates the concept of Cloud Computing. http://bidduthossain.info/
  • 4. CLOUD COMPUTING  Cloud computing is a set of internet-based computing in which many remote servers are connected to permit sharing of data-processing tasks, centralized data storage, and online access to computer services or resources.  The emergence of different new computing applications like smart environments and virtual reality requires the availability of a large pool of cloud resources and services becoming a limitation for applications that essentially a real-time response. http://bidduthossain.info/
  • 5. LIMITATIONS OF CLOUD COMPUTING  The cloud computing paradigm is unable to meet the requirements of low latency, location awareness, and mobility support, real-time services and data optimization.  How do overcome this limitation?  Edge Computing serves this purpose.  Edge computing is a mini-cloud and interplay with the cloud resources.  It transfers the utility services hosted in the centralized cloud data center to decentralized geographical distribution edge network devices.  Real-time analysis of data at the level of local devices and edge nodes reduces data flow and operating costs of using cloud services, traffic and data transfer between the Edge and the cloud.http://bidduthossain.info/
  • 6. EDGE COMPUTING  Edge computing (EC) has been emerging as one of the most promising solutions regarding the cloud limitation, depending on the cooperation of nodes by moving services directly to end devices and caching information locally.  An edge computing paradigm that goals to extend the cloud resources and services and enable them to be closer the edge of an enterprise’s network.  EC is defined by different authors as a set of devices, sensors, computer resources and computers that generate and collect data that are then sent to cloud centers. HTTP://bidduthossain.INFO/
  • 7. COMPARISON BETWEEN CC AND EC Edge Cloud Advantage Reduce end-user response time Low latency Distributed computation Reduces bandwidth cost, network traffic and storage. Scalable Big data processing Unlimited storage capacity Disadvantage Storage capacity is limited EC needs proprietary network Difficult to maintain the security of data. Centralized computation Response time is slow Generate network traffic High latency HTTP://BIDDUTHOSSAIN.INFO/
  • 8. APPLICATION OF EDGE COMPUTING  Internet of Things (IoT) smart environment (Smart building, Smart surveillance)  Virtual reality  Smart traffic, transportation  Smart health environment  Industrial automation  Agriculture  Online gaming  Real time big data analysis HTTP://BIDDUTHOSSAIN.INFO/
  • 9. STRUCTURE OF EC  The Figure 1 components are described as follows:  Devices and sensors: responsible to produce and collect data. This group of devices interacts directly with the end user (sensors, smart phones, tablets, smart bracelets or laptops).  Edge infrastructure: there are distributed data centers to provide real- time data processing, data visualization, analytics, filtering, and optimizing. They being located closer to end users, they process, cache storage, and perform calculations for a large volume of data.  Cloud: It provides a greater density of computing, storage, networking resources. Cloud servers host services for automatic learning, big data analysis and business intelligence. HTTP://BIDDUTHOSSAIN.INFO/
  • 10. CONSIDERATION ISSUES OF EC  Reliability (Failure of individual node/ server/ end user, Lack of network coverage, Failure of edge network and service platform)  Scalability (Adding a new point of service, Adding new services nodes, Utilizing cloud interplay)  Security (Isolation of data paths and memory as multiple users share edge network, Security of edge devices from malicious users)  Resource management (Resource allocation, Load balancing, Monitoring)  Interoperability (Heterogeneous devices, protocols, and services) HTTP://BIDDUTHOSSAIN.INFO/
  • 11. USED TECHNOLOGIES IN EC  Network functions virtualization (NFV) can be applied to network nodes to ensure security and isolation of user domains.  Network functions virtualization (NFV) and Software defined networking (SDN) are potential technologies that enable ease of management of edge resources. HTTP://BIDDUTHOSSAIN.INFO/
  • 12. CONCERNING ISSUES OF EC  Uninterrupted Communication: movement of users from one edge network to different edge network coverage area interrupts communication.  Privacy and Security: As the end user's data computed remotely so the privacy and security are the major issues of end users.  Real time data processing: connectivity among many different devices (sensors, smart phones, tablets, smart bracelets or laptops) creates in a flood of data production. At real time to compute these data is a major concern.  Standardization: Different vendors offer different edge devices as service providers. Without common standardization it is impossible to communicate between heterogeneous edge networks.HTTP://BIDDUTHOSSAIN.INFO/
  • 13. FUTURE RESEARCH ISSUES  At the internet-based communication data security and response time are the major concern of users.  Enhancement security system and ensure maximum utilization of resources in Edge Computing.  Develop real time data processing method for load balancing and increase the performance of EC. HTTP://BIDDUTHOSSAIN.INFO/