SlideShare une entreprise Scribd logo
1  sur  12
Edge computing refers to a distributed computing
paradigm where data processing and storage are
performed closer to the edge of the network, such
as on connected devices or local servers, rather
than in a centralized location such as a cloud.
Here are some types of edge computing, as following them:
Mobile Edge Computing (MEC): MEC allows for the processing of data at
the edge of the mobile network, closer to the user. It provides low
latency, high bandwidth, and a better user experience.
Fog Computing: Fog computing refers to the process of computing and
storage resources being placed in the edge of the network to reduce the
amount of data that needs to be transferred to the cloud. It enables
faster data processing, lower latency, and better security.
Cloudlet Computing: Cloudlet computing is a type of edge computing
that involves the deployment of small data centres, called cloudlets, at
the edge of the network. Cloudlets are designed to provide
computational resources for mobile devices, reducing latency and
improving performance.
Smart Edge Computing: Smart edge computing refers to the use of
artificial intelligence and machine learning algorithms at the edge of the
network. It enables the creation of intelligent and autonomous devices,
which can perform complex computations locally.
Satellite Edge Computing: Satellite edge computing is the process of
placing computing and storage resources on satellites, closer to the
point of data generation. It enables faster data processing, lower
latency, and improved communication with remote locations.
Industrial Edge Computing: Industrial edge computing refers to the use
of edge computing in industrial settings, such as manufacturing plants,
where real-time data processing and analysis are critical. It enables
predictive maintenance, improved safety, and better efficiency.
The following are some of the components of edge computing:
Edge Devices: These are the devices that are located at the edge of the network,
such as smartphones, IoT devices, and sensors, which collect data and perform
some basic processing before sending the data to the edge computing
infrastructure.
Edge Servers: These are the servers that are located at the edge of the network,
which process data and run applications closer to the data source, reducing
latency and improving performance. These servers can be physical or virtual and
can be located in various locations, such as cell towers, factories, and retail stores.
Edge Gateways: These are the devices that connect the edge devices to the edge
servers, providing a bridge between the edge devices and the edge computing
infrastructure. Edge gateways can be hardware or software-based and can
provide functions such as protocol conversion, data filtering, and security.
Edge Computing Infrastructure: This includes all the hardware and software
components required to build an edge computing system, such as servers,
storage devices, networking equipment, and software platforms for managing
and orchestrating edge applications.
Edge Applications: These are the applications that run on the edge computing
infrastructure, performing data processing, analytics, and other tasks closer to
the data source, which can help to reduce latency, improve performance, and
reduce bandwidth usage. Examples of edge applications include real-time video
analytics, predictive maintenance, and autonomous vehicles.
Edge Analytics: Edge analytics refers to the process of analysing data at the edge
of the network, where the data is generated, to derive insights and make
decisions in real-time. Edge analytics can help to reduce the latency associated
with sending data to a centralized location for analysis, enabling faster decision-
making.
Edge computing architecture refers to the design and
implementation of computing systems that enable the processing,
storage, and analysis of data closer to the edge of the network, or
where the data is being generated or consumed. This architecture
is designed to minimize latency, reduce bandwidth requirements,
and improve data security.
At its core, edge computing architecture involves the deployment
of small computing devices, such as routers, gateways, and micro
data centers, at the network edge. These devices are capable of
processing data in real-time, which can reduce the need for data to
be transmitted to a centralized data center for processing.
The working of edge computing can be summarized in the following steps:
• Data is generated by devices at the edge of the network, such as sensors,
cameras, and other IoT devices.
• This data is collected by local gateways or edge servers that are located
closer to the devices, reducing latency and network traffic.
• The edge servers process and analyze the data in real-time, using
algorithms and machine learning models to derive insights and actions.
• The results of the analysis are then sent to the cloud for further processing
or storage, or directly to the end-user devices for immediate action.
• Edge computing can also be used to provide real-time services and
applications, such as video analytics, facial recognition, and natural
language processing.
There are several advantages of edge computing over traditional cloud
computing:
Reduced Latency: Edge computing brings data processing closer to the source of
data, reducing the time it takes for the data to be transmitted to a central location
and back. This reduces latency and improves application performance, making it
particularly beneficial for real-time applications like video streaming, autonomous
vehicles, and industrial control systems.
Improved Reliability: Edge computing can increase the reliability of applications
by reducing the dependence on centralized cloud resources. By distributing
computing power across multiple nodes, edge computing can create a more fault-
tolerant system that can continue to function even if one node fails.
Enhanced Privacy and Security: Edge computing can improve privacy and security
by keeping data closer to its source and reducing the need for data to be
transmitted to a central location. This can reduce the risk of data breaches and
improve compliance with data protection regulations.
Reduced Bandwidth Costs: Edge computing can help reduce bandwidth
costs by processing data locally and only transmitting the data that is
needed to a central location. This can reduce the amount of data that
needs to be transmitted over the network, saving on bandwidth costs and
reducing network congestion.
Increased Scalability: Edge computing can enable applications to scale
more easily by distributing computing power across multiple nodes. This
can improve the performance and reliability of applications that need to
scale rapidly in response to changing demand.
Better Performance: Edge computing can improve application
performance by processing data locally, reducing the amount of data that
needs to be transmitted to a central location, and enabling faster
response times.
While edge computing offers several advantages over traditional cloud
computing, there are also some disadvantages to consider, including:
Limited Processing Power: Edge devices typically have limited processing
power compared to cloud servers, which can limit the complexity of the
tasks that can be performed on the data.
Security Risks: Since edge devices are often deployed in remote or
uncontrolled locations, they are vulnerable to physical tampering, theft,
and hacking. Securing these devices and the data they process can be
challenging.
Increased Complexity: Implementing an edge computing system requires
a more complex infrastructure than traditional cloud computing, including
more hardware and software components, which can be challenging to
manage.
Data Consistency: Since data is processed locally, it may not always
be consistent with data processed in the cloud, leading to
discrepancies that can be difficult to reconcile.
Scalability: Edge computing systems may be more difficult to scale
than traditional cloud computing systems since they rely on multiple
distributed devices, and adding new devices can be challenging.
Maintenance and Upgrades: Maintenance and upgrades for edge
devices can be challenging, especially if the devices are located in
remote or hard-to-reach locations.
Higher Costs: Edge computing can require significant investment in
hardware, software, and networking infrastructure, which can make
it more expensive than traditional cloud computing.
www.digitalthinkerhelp.com
Happy Learning!!

Contenu connexe

Tendances

Tendances (20)

Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
seminar report on wireless communication ppt
seminar report on wireless communication pptseminar report on wireless communication ppt
seminar report on wireless communication ppt
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Fog computing
Fog computingFog computing
Fog computing
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Presentation on Green IoT
Presentation on Green IoTPresentation on Green IoT
Presentation on Green IoT
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Similaire à Ultimate Guide to Edge Computing!!

What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationHarshDixit68
 
Title: Unlock The Power of Edge Compute Services | Digital Carbon
Title: Unlock The Power of Edge Compute Services | Digital CarbonTitle: Unlock The Power of Edge Compute Services | Digital Carbon
Title: Unlock The Power of Edge Compute Services | Digital CarbonDigital Carbon
 
Edge Computing: Redefining the Boundaries of Computing
Edge Computing: Redefining the Boundaries of ComputingEdge Computing: Redefining the Boundaries of Computing
Edge Computing: Redefining the Boundaries of ComputingDigital Carbon
 
What Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowWhat Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowDigital Carbon
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptxdrth5
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
 
Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docxSVITSEEERK
 
Unleashing the Power of Edge Computing in Enterprise: A Transformative Frontier
Unleashing the Power of Edge Computing in Enterprise: A Transformative FrontierUnleashing the Power of Edge Computing in Enterprise: A Transformative Frontier
Unleashing the Power of Edge Computing in Enterprise: A Transformative FrontierElina619459
 
Everything You Need to Know About Edge Computing Technologies
Everything You Need to Know About Edge Computing TechnologiesEverything You Need to Know About Edge Computing Technologies
Everything You Need to Know About Edge Computing TechnologiesCerebrum Infotech
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Transforming Businesses With Edge Computing.pptx
Transforming Businesses With Edge Computing.pptxTransforming Businesses With Edge Computing.pptx
Transforming Businesses With Edge Computing.pptxaitech1
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptxandre241421
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTINGMosin A
 

Similaire à Ultimate Guide to Edge Computing!! (20)

What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentation
 
Title: Unlock The Power of Edge Compute Services | Digital Carbon
Title: Unlock The Power of Edge Compute Services | Digital CarbonTitle: Unlock The Power of Edge Compute Services | Digital Carbon
Title: Unlock The Power of Edge Compute Services | Digital Carbon
 
Edge Computing: Redefining the Boundaries of Computing
Edge Computing: Redefining the Boundaries of ComputingEdge Computing: Redefining the Boundaries of Computing
Edge Computing: Redefining the Boundaries of Computing
 
What Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowWhat Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to Know
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
Edge comp
Edge compEdge comp
Edge comp
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docx
 
Unleashing the Power of Edge Computing in Enterprise: A Transformative Frontier
Unleashing the Power of Edge Computing in Enterprise: A Transformative FrontierUnleashing the Power of Edge Computing in Enterprise: A Transformative Frontier
Unleashing the Power of Edge Computing in Enterprise: A Transformative Frontier
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
Everything You Need to Know About Edge Computing Technologies
Everything You Need to Know About Edge Computing TechnologiesEverything You Need to Know About Edge Computing Technologies
Everything You Need to Know About Edge Computing Technologies
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Transforming Businesses With Edge Computing.pptx
Transforming Businesses With Edge Computing.pptxTransforming Businesses With Edge Computing.pptx
Transforming Businesses With Edge Computing.pptx
 
Edge Comp.pptx
Edge Comp.pptxEdge Comp.pptx
Edge Comp.pptx
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Edge computing
Edge computing Edge computing
Edge computing
 
Edge UPDATED.pptx
Edge UPDATED.pptxEdge UPDATED.pptx
Edge UPDATED.pptx
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 

Plus de DigitalThinkerHelp

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesDigitalThinkerHelp
 
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!DigitalThinkerHelp
 
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!How to See Your Liked/Saved Reels on Instagram? Easy Guide!!
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!DigitalThinkerHelp
 
How to Fix: Instagram Camera Not Working on iPhone/Android – 12 Ways!!
How to Fix: Instagram Camera Not Working on iPhone/Android –  12 Ways!!How to Fix: Instagram Camera Not Working on iPhone/Android –  12 Ways!!
How to Fix: Instagram Camera Not Working on iPhone/Android – 12 Ways!!DigitalThinkerHelp
 
What is Flash Memory with its Types, Examples, and Devices?
What is Flash Memory with its Types, Examples, and Devices?What is Flash Memory with its Types, Examples, and Devices?
What is Flash Memory with its Types, Examples, and Devices?DigitalThinkerHelp
 
Twisted Pair Cable: Diagram, Types, Examples, and Application!!
Twisted Pair Cable: Diagram, Types, Examples, and Application!!Twisted Pair Cable: Diagram, Types, Examples, and Application!!
Twisted Pair Cable: Diagram, Types, Examples, and Application!!DigitalThinkerHelp
 
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!DigitalThinkerHelp
 
Mainframe Computer with its Example, Types, Uses, and Features!!
Mainframe Computer with its Example, Types, Uses, and Features!!Mainframe Computer with its Example, Types, Uses, and Features!!
Mainframe Computer with its Example, Types, Uses, and Features!!DigitalThinkerHelp
 
Demand Paging in OS (Operating System): Example, Advantages, Working
Demand Paging in OS (Operating System): Example, Advantages, WorkingDemand Paging in OS (Operating System): Example, Advantages, Working
Demand Paging in OS (Operating System): Example, Advantages, WorkingDigitalThinkerHelp
 
Block Diagram of Computer with its Components & Functions!!
Block Diagram of Computer with its Components & Functions!!Block Diagram of Computer with its Components & Functions!!
Block Diagram of Computer with its Components & Functions!!DigitalThinkerHelp
 
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!Output Devices of Computer: List, Types, Examples, Functions, and Uses!!
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!DigitalThinkerHelp
 
Types of Computer - Digital Thinker Help
Types of Computer - Digital Thinker HelpTypes of Computer - Digital Thinker Help
Types of Computer - Digital Thinker HelpDigitalThinkerHelp
 
Amazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingAmazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingDigitalThinkerHelp
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsDigitalThinkerHelp
 

Plus de DigitalThinkerHelp (15)

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with Examples
 
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!
How to Hide Snapchat Score from Friend or Unknown Person? Full Guide!!
 
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!How to See Your Liked/Saved Reels on Instagram? Easy Guide!!
How to See Your Liked/Saved Reels on Instagram? Easy Guide!!
 
How to Fix: Instagram Camera Not Working on iPhone/Android – 12 Ways!!
How to Fix: Instagram Camera Not Working on iPhone/Android –  12 Ways!!How to Fix: Instagram Camera Not Working on iPhone/Android –  12 Ways!!
How to Fix: Instagram Camera Not Working on iPhone/Android – 12 Ways!!
 
What is Flash Memory with its Types, Examples, and Devices?
What is Flash Memory with its Types, Examples, and Devices?What is Flash Memory with its Types, Examples, and Devices?
What is Flash Memory with its Types, Examples, and Devices?
 
Twisted Pair Cable: Diagram, Types, Examples, and Application!!
Twisted Pair Cable: Diagram, Types, Examples, and Application!!Twisted Pair Cable: Diagram, Types, Examples, and Application!!
Twisted Pair Cable: Diagram, Types, Examples, and Application!!
 
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!
Analog Computer: Definition, Examples, Types, Characteristics, and Advantages!!
 
Mainframe Computer with its Example, Types, Uses, and Features!!
Mainframe Computer with its Example, Types, Uses, and Features!!Mainframe Computer with its Example, Types, Uses, and Features!!
Mainframe Computer with its Example, Types, Uses, and Features!!
 
Demand Paging in OS (Operating System): Example, Advantages, Working
Demand Paging in OS (Operating System): Example, Advantages, WorkingDemand Paging in OS (Operating System): Example, Advantages, Working
Demand Paging in OS (Operating System): Example, Advantages, Working
 
Block Diagram of Computer with its Components & Functions!!
Block Diagram of Computer with its Components & Functions!!Block Diagram of Computer with its Components & Functions!!
Block Diagram of Computer with its Components & Functions!!
 
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!Output Devices of Computer: List, Types, Examples, Functions, and Uses!!
Output Devices of Computer: List, Types, Examples, Functions, and Uses!!
 
Types of Computer - Digital Thinker Help
Types of Computer - Digital Thinker HelpTypes of Computer - Digital Thinker Help
Types of Computer - Digital Thinker Help
 
Amazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingAmazing Some Applications of Soft Computing
Amazing Some Applications of Soft Computing
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Ultimate Guide to Edge Computing!!

  • 1. Edge computing refers to a distributed computing paradigm where data processing and storage are performed closer to the edge of the network, such as on connected devices or local servers, rather than in a centralized location such as a cloud.
  • 2. Here are some types of edge computing, as following them: Mobile Edge Computing (MEC): MEC allows for the processing of data at the edge of the mobile network, closer to the user. It provides low latency, high bandwidth, and a better user experience. Fog Computing: Fog computing refers to the process of computing and storage resources being placed in the edge of the network to reduce the amount of data that needs to be transferred to the cloud. It enables faster data processing, lower latency, and better security. Cloudlet Computing: Cloudlet computing is a type of edge computing that involves the deployment of small data centres, called cloudlets, at the edge of the network. Cloudlets are designed to provide computational resources for mobile devices, reducing latency and improving performance.
  • 3. Smart Edge Computing: Smart edge computing refers to the use of artificial intelligence and machine learning algorithms at the edge of the network. It enables the creation of intelligent and autonomous devices, which can perform complex computations locally. Satellite Edge Computing: Satellite edge computing is the process of placing computing and storage resources on satellites, closer to the point of data generation. It enables faster data processing, lower latency, and improved communication with remote locations. Industrial Edge Computing: Industrial edge computing refers to the use of edge computing in industrial settings, such as manufacturing plants, where real-time data processing and analysis are critical. It enables predictive maintenance, improved safety, and better efficiency.
  • 4. The following are some of the components of edge computing: Edge Devices: These are the devices that are located at the edge of the network, such as smartphones, IoT devices, and sensors, which collect data and perform some basic processing before sending the data to the edge computing infrastructure. Edge Servers: These are the servers that are located at the edge of the network, which process data and run applications closer to the data source, reducing latency and improving performance. These servers can be physical or virtual and can be located in various locations, such as cell towers, factories, and retail stores. Edge Gateways: These are the devices that connect the edge devices to the edge servers, providing a bridge between the edge devices and the edge computing infrastructure. Edge gateways can be hardware or software-based and can provide functions such as protocol conversion, data filtering, and security.
  • 5. Edge Computing Infrastructure: This includes all the hardware and software components required to build an edge computing system, such as servers, storage devices, networking equipment, and software platforms for managing and orchestrating edge applications. Edge Applications: These are the applications that run on the edge computing infrastructure, performing data processing, analytics, and other tasks closer to the data source, which can help to reduce latency, improve performance, and reduce bandwidth usage. Examples of edge applications include real-time video analytics, predictive maintenance, and autonomous vehicles. Edge Analytics: Edge analytics refers to the process of analysing data at the edge of the network, where the data is generated, to derive insights and make decisions in real-time. Edge analytics can help to reduce the latency associated with sending data to a centralized location for analysis, enabling faster decision- making.
  • 6. Edge computing architecture refers to the design and implementation of computing systems that enable the processing, storage, and analysis of data closer to the edge of the network, or where the data is being generated or consumed. This architecture is designed to minimize latency, reduce bandwidth requirements, and improve data security. At its core, edge computing architecture involves the deployment of small computing devices, such as routers, gateways, and micro data centers, at the network edge. These devices are capable of processing data in real-time, which can reduce the need for data to be transmitted to a centralized data center for processing.
  • 7. The working of edge computing can be summarized in the following steps: • Data is generated by devices at the edge of the network, such as sensors, cameras, and other IoT devices. • This data is collected by local gateways or edge servers that are located closer to the devices, reducing latency and network traffic. • The edge servers process and analyze the data in real-time, using algorithms and machine learning models to derive insights and actions. • The results of the analysis are then sent to the cloud for further processing or storage, or directly to the end-user devices for immediate action. • Edge computing can also be used to provide real-time services and applications, such as video analytics, facial recognition, and natural language processing.
  • 8. There are several advantages of edge computing over traditional cloud computing: Reduced Latency: Edge computing brings data processing closer to the source of data, reducing the time it takes for the data to be transmitted to a central location and back. This reduces latency and improves application performance, making it particularly beneficial for real-time applications like video streaming, autonomous vehicles, and industrial control systems. Improved Reliability: Edge computing can increase the reliability of applications by reducing the dependence on centralized cloud resources. By distributing computing power across multiple nodes, edge computing can create a more fault- tolerant system that can continue to function even if one node fails. Enhanced Privacy and Security: Edge computing can improve privacy and security by keeping data closer to its source and reducing the need for data to be transmitted to a central location. This can reduce the risk of data breaches and improve compliance with data protection regulations.
  • 9. Reduced Bandwidth Costs: Edge computing can help reduce bandwidth costs by processing data locally and only transmitting the data that is needed to a central location. This can reduce the amount of data that needs to be transmitted over the network, saving on bandwidth costs and reducing network congestion. Increased Scalability: Edge computing can enable applications to scale more easily by distributing computing power across multiple nodes. This can improve the performance and reliability of applications that need to scale rapidly in response to changing demand. Better Performance: Edge computing can improve application performance by processing data locally, reducing the amount of data that needs to be transmitted to a central location, and enabling faster response times.
  • 10. While edge computing offers several advantages over traditional cloud computing, there are also some disadvantages to consider, including: Limited Processing Power: Edge devices typically have limited processing power compared to cloud servers, which can limit the complexity of the tasks that can be performed on the data. Security Risks: Since edge devices are often deployed in remote or uncontrolled locations, they are vulnerable to physical tampering, theft, and hacking. Securing these devices and the data they process can be challenging. Increased Complexity: Implementing an edge computing system requires a more complex infrastructure than traditional cloud computing, including more hardware and software components, which can be challenging to manage.
  • 11. Data Consistency: Since data is processed locally, it may not always be consistent with data processed in the cloud, leading to discrepancies that can be difficult to reconcile. Scalability: Edge computing systems may be more difficult to scale than traditional cloud computing systems since they rely on multiple distributed devices, and adding new devices can be challenging. Maintenance and Upgrades: Maintenance and upgrades for edge devices can be challenging, especially if the devices are located in remote or hard-to-reach locations. Higher Costs: Edge computing can require significant investment in hardware, software, and networking infrastructure, which can make it more expensive than traditional cloud computing.