SlideShare uma empresa Scribd logo
1 de 11
Definition, Vision, Opportunities, Challenges and Case Study
THE ROLE OF EDGE COMPUTING IN IOT
- Sameer Ahmed
Edge computing is a “mesh network of micro data centers
that process or store critical data locally and push all
received data to a central data center or cloud storage
repository, in a footprint of less than 100 square feet,”
according to research firm IDC.
Edge computing is a distributed, open IT architecture that
features decentralized processing power, enabling mobile
computing and Internet of Things (IoT) technologies. In
edge computing, data is processed by the device itself or by
a local computer or server, rather than being transmitted to
a data centre
DEFINATION - WHAT IS EDGE COMPUTING?
Edge Computing helps enterprises address cost,
bandwidth and latency issues across a broad range of IoT
applications. Here are three key reasons why you need
Edge Computing:
 Reduce the Amount of Data Transmitted and Stored in
the Cloud
 Reduce the Lag Time in Data Transmission/Processing
 Reduce the Signal to Noise Ratio
WHY DO WE NEED EDGE COMPUTING?
CHALLENGES AND OPPORTUNITIES
Challenges
General purpose computing on edge
nodes
Discovering edge nodes
Partitioning and offloading tasks
Uncompromising Quality-of-service
and experience
Using edge nodes publicly and
securely
Opportunities
Standards, benchmarking and
marketplace
Frameworks and languages
Lightweight libraries and algorithms
Micro operating systems and
virtualization
Industry-academic collaborations
EDGE COMPUTING ARCHITECTURE
Let’s see the big picture below to understand the main components of this architecture.
The diagram above shows the edge side and cloud side. In the edge side the things could be sensors, actuators,
devices and a crucial thing called gateway. This gateway has the responsibility to establish communications between
things and cloud services and also orchestrate the actions between the things.
BENEFITS OF EDGE COMPUTING
EDGE COMPUTING BENEFITS - KEY DRIVERS FOR SMART MANUFACTURING
There are many advantages to organizations when they adopt the edge
platform, so let’s see how edge computing is proving to be beneficial for
enterprises:
 Quick responses – Due to high computational power at the edge of a
device, the time taken to process data and send back to the host is
very quick. There is no trip to the cloud for analysis which makes the
process faster and highly responsive.
 Low operating cost – There are almost no costs involved due to
smaller operations and very low data management expenses.
 Security of the highest level This technology also allows filtering of
sensitive information and transfers only the important data, which
provides an adequate amount of security.
 A pocket-friendly solution –Edge computing performs data
analytics at the device location which saves the final costs of an
overall IT solution.
 A true connection between legacy and modern
FMCG – CPG Line Monitoring:
As packaging lines carry variety of old and new machines, many aren’t designed to share data. The solution demanded retrofitting of
hardware and custom dashboards to visualize multiple lines and machines. Altizon, along with the hardware partner, designed an
integrated IoT solution. It deployed high quality wireless object detection sensors on case sealers, wrapping machines, and box printers to
capture real-time operating pulse. The 24/7 real-time machine data at Datonis Edge helped analyze equipment failure & generate alerts.
The business intelligence reports with machine idle time, breakdown reason codes, and overall productivity/OEE data helped management
in better planning and addressing issues..
USE CASES OF EDGE COMPUTING - FMCG
Read More - https://altizon.com/cpg-fmcg-iot-case-study/
Deployment of Enterprise & Campus Networks:
A reliable network that’s readily available is crucial for
large enterprises or campus networks. Numerous
individuals using the same network can result in high
latency for the end users. MEC resolves that issue of high
latency. MEC in an enterprise network will allow copious
employees simultaneous access to a company’s intranet,
in order to complete mass training without halting
network speed.
USE CASES OF EDGE COMPUTING
Edge computing has been implemented in a variety of IIoT deployments; however, the need to modernize
edge architectures became apparent with the emergence of cloud computing. The rapid decline in processor
and memory cost enables more advanced decision-logic closer to where the data is created, at the edge. The
industry has learned that a “one-size-fits-all” approach has never been adequate for IIoT.
The next phase of the work will be to address these concerns in the Technical Report. While we have tried to
lay out the significance of edge computing of future IIoT systems, we know it is a never-ending task as new IIoT
applications and new considerations appear every day. We intend this paper to trigger more in-depth
conversations and invite your participation.
This is not the end; rather, a beginning.
CONCLUSION
REFERENCES
[1] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
[2] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The Google file system,” ACM SIGOPS Oper. Syst. Rev., vol. 37,
no. 5, pp. 29–43, 2003.
[3] J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” Commun. ACM,
vol. 51, no. 1, pp. 107–113, 2008.
[4] K. Shvachko, H. Kuang, S. Radia, and R. Chansler, “The hadoop distributed file system,” in Proc. IEEE 26th
Symp. Mass Storage Syst. Technol. (MSST), Incline Village, NV, USA, 2010, pp. 1–10.
[5] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, “Spark: Cluster computing with
working sets,” in Proc. 2nd USENIX Conf. Hot Topics Cloud Comput., vol. 10. Boston, MA, USA, 2010, p. 10.
[6] K. Ashton, “That Internet of Things thing,” RFiD J., vol. 22, no. 7, pp. 97–114, 2009.

Mais conteúdo relacionado

Mais procurados

Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdffirstlast467690
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptxSachuS16
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentationFizaKhan82
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingRamneek Kalra
 
Edge Computing Presentation.pptx
Edge Computing Presentation.pptxEdge Computing Presentation.pptx
Edge Computing Presentation.pptxnobita601530
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 

Mais procurados (20)

Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
Edge computing presentation
Edge computing presentationEdge computing presentation
Edge computing presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Edge Computing Presentation.pptx
Edge Computing Presentation.pptxEdge Computing Presentation.pptx
Edge Computing Presentation.pptx
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 

Semelhante a What is Edge Computing and Why does it matter in IoT?

Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docxSVITSEEERK
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvvijayalaxmipatil2002
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeCognizant
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
 
What Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowWhat Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowDigital Carbon
 
AI Edge Computing Technology: Edge Computing and Its Future
AI Edge Computing Technology: Edge Computing and Its FutureAI Edge Computing Technology: Edge Computing and Its Future
AI Edge Computing Technology: Edge Computing and Its FutureKavika Roy
 
What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationHarshDixit68
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET Journal
 
edgecomputing-201203071131.pptx
edgecomputing-201203071131.pptxedgecomputing-201203071131.pptx
edgecomputing-201203071131.pptxWalidMG1
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfEnterprise Wired
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingIRJET Journal
 

Semelhante a What is Edge Computing and Why does it matter in IoT? (20)

Edge Computing.docx
Edge Computing.docxEdge Computing.docx
Edge Computing.docx
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
What Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to KnowWhat Is Edge Computing? Everything You Need to Know
What Is Edge Computing? Everything You Need to Know
 
AI Edge Computing Technology: Edge Computing and Its Future
AI Edge Computing Technology: Edge Computing and Its FutureAI Edge Computing Technology: Edge Computing and Its Future
AI Edge Computing Technology: Edge Computing and Its Future
 
What-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentationWhat-is-Edge-Computing power point presentation
What-is-Edge-Computing power point presentation
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge Computing
 
edgecomputing-201203071131.pptx
edgecomputing-201203071131.pptxedgecomputing-201203071131.pptx
edgecomputing-201203071131.pptx
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

What is Edge Computing and Why does it matter in IoT?

  • 1. Definition, Vision, Opportunities, Challenges and Case Study THE ROLE OF EDGE COMPUTING IN IOT - Sameer Ahmed
  • 2. Edge computing is a “mesh network of micro data centers that process or store critical data locally and push all received data to a central data center or cloud storage repository, in a footprint of less than 100 square feet,” according to research firm IDC. Edge computing is a distributed, open IT architecture that features decentralized processing power, enabling mobile computing and Internet of Things (IoT) technologies. In edge computing, data is processed by the device itself or by a local computer or server, rather than being transmitted to a data centre DEFINATION - WHAT IS EDGE COMPUTING?
  • 3. Edge Computing helps enterprises address cost, bandwidth and latency issues across a broad range of IoT applications. Here are three key reasons why you need Edge Computing:  Reduce the Amount of Data Transmitted and Stored in the Cloud  Reduce the Lag Time in Data Transmission/Processing  Reduce the Signal to Noise Ratio WHY DO WE NEED EDGE COMPUTING?
  • 4. CHALLENGES AND OPPORTUNITIES Challenges General purpose computing on edge nodes Discovering edge nodes Partitioning and offloading tasks Uncompromising Quality-of-service and experience Using edge nodes publicly and securely Opportunities Standards, benchmarking and marketplace Frameworks and languages Lightweight libraries and algorithms Micro operating systems and virtualization Industry-academic collaborations
  • 5. EDGE COMPUTING ARCHITECTURE Let’s see the big picture below to understand the main components of this architecture. The diagram above shows the edge side and cloud side. In the edge side the things could be sensors, actuators, devices and a crucial thing called gateway. This gateway has the responsibility to establish communications between things and cloud services and also orchestrate the actions between the things.
  • 6. BENEFITS OF EDGE COMPUTING
  • 7. EDGE COMPUTING BENEFITS - KEY DRIVERS FOR SMART MANUFACTURING There are many advantages to organizations when they adopt the edge platform, so let’s see how edge computing is proving to be beneficial for enterprises:  Quick responses – Due to high computational power at the edge of a device, the time taken to process data and send back to the host is very quick. There is no trip to the cloud for analysis which makes the process faster and highly responsive.  Low operating cost – There are almost no costs involved due to smaller operations and very low data management expenses.  Security of the highest level This technology also allows filtering of sensitive information and transfers only the important data, which provides an adequate amount of security.  A pocket-friendly solution –Edge computing performs data analytics at the device location which saves the final costs of an overall IT solution.  A true connection between legacy and modern
  • 8. FMCG – CPG Line Monitoring: As packaging lines carry variety of old and new machines, many aren’t designed to share data. The solution demanded retrofitting of hardware and custom dashboards to visualize multiple lines and machines. Altizon, along with the hardware partner, designed an integrated IoT solution. It deployed high quality wireless object detection sensors on case sealers, wrapping machines, and box printers to capture real-time operating pulse. The 24/7 real-time machine data at Datonis Edge helped analyze equipment failure & generate alerts. The business intelligence reports with machine idle time, breakdown reason codes, and overall productivity/OEE data helped management in better planning and addressing issues.. USE CASES OF EDGE COMPUTING - FMCG Read More - https://altizon.com/cpg-fmcg-iot-case-study/
  • 9. Deployment of Enterprise & Campus Networks: A reliable network that’s readily available is crucial for large enterprises or campus networks. Numerous individuals using the same network can result in high latency for the end users. MEC resolves that issue of high latency. MEC in an enterprise network will allow copious employees simultaneous access to a company’s intranet, in order to complete mass training without halting network speed. USE CASES OF EDGE COMPUTING
  • 10. Edge computing has been implemented in a variety of IIoT deployments; however, the need to modernize edge architectures became apparent with the emergence of cloud computing. The rapid decline in processor and memory cost enables more advanced decision-logic closer to where the data is created, at the edge. The industry has learned that a “one-size-fits-all” approach has never been adequate for IIoT. The next phase of the work will be to address these concerns in the Technical Report. While we have tried to lay out the significance of edge computing of future IIoT systems, we know it is a never-ending task as new IIoT applications and new considerations appear every day. We intend this paper to trigger more in-depth conversations and invite your participation. This is not the end; rather, a beginning. CONCLUSION
  • 11. REFERENCES [1] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010. [2] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The Google file system,” ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 29–43, 2003. [3] J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” Commun. ACM, vol. 51, no. 1, pp. 107–113, 2008. [4] K. Shvachko, H. Kuang, S. Radia, and R. Chansler, “The hadoop distributed file system,” in Proc. IEEE 26th Symp. Mass Storage Syst. Technol. (MSST), Incline Village, NV, USA, 2010, pp. 1–10. [5] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, “Spark: Cluster computing with working sets,” in Proc. 2nd USENIX Conf. Hot Topics Cloud Comput., vol. 10. Boston, MA, USA, 2010, p. 10. [6] K. Ashton, “That Internet of Things thing,” RFiD J., vol. 22, no. 7, pp. 97–114, 2009.