Governmentpolytechniccollege MATTANNUR-670702: (Department of Technical Education, Kerala)
Governmentpolytechniccollege MATTANNUR-670702: (Department of Technical Education, Kerala)
MATTANNUR-670702
SEMINAR REPOPORT ON
EDGE COMPUTING
SUBMITTED BY
ANAMAYAN K
REG NO :
2201042138
DEPARTMENT OF ELECTRONICS
ENGINEERING 2024-25
GOVERNMENTPOLYTECHNICCOLLEGE
MATTANNUR-670702
CERTIFICATE
I hereby declare that the report of the EDGE COMPUTING work entitled which is
being submitted to the Govt. Polytechnic College Mattannur, in partial fulfillment of the
requirement for the award of Diploma in ELECTRONICS ENGINEERING is a confide report
of the work carried out by me. The material in this report has not been submitted to any
institute for the award of any degree.
I would like to take this opportunity to extend my sincere thanks to people who helped me to
make this seminar possible. This seminar will be incomplete without mentioning all the
people who helped me to make it real.
Firstly, I would like to thank GOD, almighty, our supreme guide, for bestowing his
blessings upon me in my entire endeavor.
I would like to express my deepest gratitude Mrs. SHAMILA K (Principal GPTC,
Mattannur), Mr. GEORGEKUTTY P P (Head of Department of Electronics Engineering.),
for the help rendered by him to prepare and present this Seminar in proper way. Moreover I
am very much indebted to Mr. SREEJITH A (Lecturer, Electronics Engineering, seminar
coordinator), for their advice.
I am also indebted to all my friends and classmates who have given valuable suggestion
and encouragement.
ANAMAYAN K
ABSTRACT
The proliferation of Internet of Things (IoT) and the success of rich cloud services have
pushed the horizon of a new computing paradigm, edge computing, which calls for processing the
data at the edge of the network.
Edge computing has the potential to address the concerns of response time requirement,
battery life constraint, bandwidth cost saving, as well as data safety and privacy. In this paper, we
introduce the definition of edge computing, followed by several case studies, ranging from cloud
offloading to smart home and city, as well as collaborative edge to materialize the concept of edge
computing.
Finally, we present several challenges and opportunities in the field of edge computing, and
hope this paper will gain attention from the community and inspire more research in this direction.
Tableofcontent
Declaration i
Acknowledgement ii
Abstract iii
Chapter No. Contents Page No.
1. Introduction 1
2. Literature Survey 4
3.1 Scope 7
3.2 Objective 7
5. Conclusions 19
LIST OF FIGURES
Figure No. Description Page No
1.1 Cloud computing paradigm 2
ABBREVIATION
CHAPTER 1
INTRODUCTION
Internet of Things (IoT) was first introduced to the community in 1999 for supply chain
management, and then the concept of “making a computer sense information without the aid
of human intervention” was widely adapted to other fields such as healthcare, home,
environment, and transports.Now with IoT, we will arrive in the post-cloud era, where there
will be a large quality of data generator by things that are immersed in our daily life, and a lot
of applications will also be deployed at the edge to consume these data. By 2019, data produced
by people, machines, and things will reach 500 zettabytes, as estimated by Cisco Global Cloud
Index, however, the global data centre IP traffic will only reach 10.4 zettabytes by that time.
By 2019, 45% of IoT-created data will be stored, processed, analysed, and acted be 50 billion
things connected to the Internet by 2020, as predicted by Cisco Internet Business Solutions
Group.Some IoT applications might require very short response time, some might involve private
data, and some might produce a large quantity of data which could be a heavy load for networks.
Cloud computing is not efficient enough to support these applications. With the push from cloud
services and pull from IoT, we envision that the edge of the network is changing from data
consumer to data producer as well as data consumer. In this paper, we attempt to contribute the
concept of edge computing. We start from the analysis of why we need edge computing, then we
give our definition and vision of edge computing. Several case studies like cloud offloading, smart
home and city as well as collaborative edge are introduced to further explain edge computing in a
detailed manner, followed by some challenges and opportunities in programmability, naming, data
abstraction, service management, privacy and security, as well as optimization metrics that are
worth future.
Page1
EDGECOMPUTING
Edge computing enables data-stream acceleration, including real-time data processing without
latency. It allows smart applications and devices to respond to data almost instantaneously, as
its being created, eliminating lag time. This is critical for technologies such as self-driving
cars, and has equally important benefits for business.
Edge computing is expected act as a strategic brain behind IoT. Identifying the role of edge
computing in IoT is the main research issue at present. Edge computing is utilized to reduce
the amount of data sent to the cloud and decrease service access latency. Figure illustrates the
complimentary role of edge and cloud computing in the IoT environment.
Page2
EDGECOMPUTING
Page3
EDGECOMPUTING
CHAPTER 2
LITERATURE SURVEY
Page4
EDGECOMPUTING
the number of commercial devices that possess sufficient resources to run full-fledged operating
systems. This change has extended the potential of the IoT.
Many early IoT devices could only collect and send data for analysis. However, the increasing
computing capacity of today’s devices allow them to perform complex computations on-site, resulting
in edge computing. Edge computing extends cloud computing capabilities by bringing services close
to the edge of a network and thus supports a new variety of services and applications. In this work,
we investigate, highlight, and report on recent advances in edge computing technologies with respect
to measuring their impact on IoT. We establish a taxonomy of edge computing by classifying and
categorizing existing literature, and by doing so, we reveal the salient and supportive features of
different edge computing paradigms for IoT. Moreover, we present the key requirements for the
successful deployment of edge computing in IoT and discuss a few indispensable scenarios of edge
computing in IoT. Several open research challenges are also outlined.
4.Internet of Things: A Survey on Enabling Technologies, Protocols, and
Applications (2015)
Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application
issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication
technologies, and Internet protocols. The basic premise is to have smart sensors collaborate
directly without human involvement to deliver a new class of applications. The current revolution
in Internet, mobile, and machine- to-machine (M2M) technologies can be seen as the first phase
of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new
applications by connecting physical objects together in support of intelligent decision making.
This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some
technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared
to other survey papers in the field, our objective is to provide a more thorough summary of the most
relevant protocols and application issues to enable researchers and application developers to get up
to speed quickly on how the different protocols fit together to deliver desired functionalities without
having to go through RFCs and the standards specifications.
We also provide an overview of some of the key IoT challenges presented in the recent literature and
provide a summary of related research work. Moreover, we explore the relation between the IoT and
other emerging technologies including big data analytics and cloud and fog computing. We also
present the need for bette rhorizontal integration among IoT services. Finally, we present detailed
service use-cases to illustrate how the different protocols presented in the paper fit together to deliver
Page5
EDGECOMPUTING
Page5
EDGECOMPUTING
CHAPTER 3
SCOPE AND OBJECTIVE
Scope
Push from Cloud Services:
Putting all the computing tasks on the cloud has been proved to be an efficient way for data processing
since the computing power on the cloud outclasses the capability of the things at the edge. However,
compared to the fast developing data processing speed, the bandwidth of the network has come to a
standstill. With the growing quantity of data generated at the edge, speed of data transportation is
becoming the bottleneck for the cloud based computing paradigm.
Pull From IoT:
Almost all kinds of electrical devices will become part of IoT, and they will play the role of data
producers as well as consumers, such as air quality sensors, LED bars, streetlights and even an
Internet-connected microwave oven. It is safe to infer that the number of things at the edge of the
network will develop to more than billions in a few years. Thus, raw data produced by them will be
enormous, making conventional cloud computing not efficient enough to handle all these data. This
means most of the data produced by IoT will never be transmitted to the cloud, instead it will be
consumed at the edge of the network.
Change from Data Consumer to Producer: In the cloud computing paradigm, the end devices at the
edge usually play as data consumer, for example, watching a YouTube video on your smart phone.
However, people are also producing data nowadays from their mobile devices. The change from data
consumer to data producer/consumer requires more function placement at the edge.
Objective
The different objectives for edge computing in the context of IoT are as follows:
Latency Minimization: High latency has become a crucial problem for IoT-based smart applications.
An alternative platform, such as edge computing, that can guarantee timely delivery of service is
required to fulfil the quality of service (QoS) requirements of delay- sensitive IoT applications (e.g.,
smart transportation and online gaming).
Page5
EDGECOMPUTING
Page5
EDGECOMPUTING
CHAPTER 4
DESIGN AND IMPLEMENTATION
Page5
EDGECOMPUTING
raw data through unreliable wireless links may also be ineffective. By contrast, edge computing is a
decentralized computing platform that brings cloud computing capabilities near IoT devices, that is,
the network edge. An important type of edge computing platform is MEC, which brings cloud
computing capabilities to the edge of a cellular network [10]. Computational and storage services in
MEC are provided at the BS. Unlike MEC, fog computing employs local fog nodes (i.e., local network
devices such as a router or switch) available within a limited geographic region to provide
computational services. Fog computing is considered a premier technology following the success of
IoT. Cloudlet is another form of edge computing, in which delay-sensitive and computation-intensive
tasks from IoT devices are performed on a server deployed in the local area network. Unlike cloud
and edge computing platforms that rely on infrastructure deployment, MAC capitalizes the shared
resources of available mobile devices within local proximity to process computation- intensive tasks.
Cloud and edge computing are used together in hybrid computing. Such infrastructure is usually
adopted when we require the large computing resources of cloud computing but cannot tolerate the
latency of the cloud. Variants of edge computing can be employed in such applications to overcome
the latency problems of cloud computing
Page5
EDGECOMPUTING
Edge Computing is a distributed architecture, simply defined as the processing of data when it
is collected. It has been emerged to minimize both bandwidth and time response in an IoT
system. The use of an edge computing technique is required when the latency is required to be
optimized to avoid network saturation as well as when the data processing burden is high at a
centralized infrastructure. An extended version of edge computing is fog computing, which is
an architecture that makes use of edge gadgets to accomplish a considerable amount of
computation, storage, communication regionally, which undoubtedly possesses input and
output from the real world referred to as transduction. Fog nodes determine whether to process
the data locally from several data sources or send the data out to cloud.
The tasks of edge computing, which people carry out in a daily manner. There are three basic
elements: input, processing, and output as summarized based.
• Data sources: As the input, any endpoint which records and collects data from clients or its
environments is described as a data source.
• Artificial intelligence: As the processing function, it is the main facet after data collected to
uncover practical observations, locate patterns and trends, produce individualized
recommendations, and improve the performance based on machine learning or data analytics
Page12
EDGECOMPUTING
models.
• Actionable insights: The results from the previous stage succeed only when an individual can
act and make any informed selection. Thus, within this stage, the insights appear in a
transparent manner in type of control panels, visualizations, alerts and so on, which motivates
communication between machines and humans, therefore generating a beneficial feedback
loop.
An organization should oversee and ensure privacy and security of their IoT framework.
Multiple terminologies used in privacy-preserving management are enumerated in the
following:
• Pseudonymity: where the pseudonym is used as an ID to ensure that an individual can utilize
the source (e.g. pseudonym) without revealing the source’s real identity. However, a user could
still be responsible for usage.
• Unobservability: assuring that an individual could utilize a resource or service without other
third parties and having the ability to observe that the resource or service is being used.
• Unlinkability: ensuring that a third party (e.g., an attacker) cannot identify whether two
objects are linked to each other or not.
• Anonymity: an individual may make use of a resource without revealing his identity.
• Confidentiality: assuring only the data proprietor and an individual can access the personal
Page13
EDGECOMPUTING
information in the edge computing. It protects against unapproved parties’ access to the data
when the individual’s data is transferred and also collected in edge or core network framework,
as well as when the data is kept or handled in edge or cloud nodes.Integrity: assuring the proper
and steady transmission of data to the accredited individual without unauthorized modification
of the data. Privacy of individuals can be impacted due to the lack of integrity measures.
• Availability: ensuring the accredited party manages to access the edge services in any regions
based on individual’s needs. This also implies that an individual’s data held in edge or cloud
nodes along with the cipher text format can be handled under various practical needs.
• Access control and authentication: access control imitates a linking point of all privacy and
security demands by the access control technique. Authentication ensures that the
identification of an individual is accredited.
Two case studies are presented in this section to illustrate the edge computing vision
comprehensively. First, we analyse a smart parking system that lessens traffic when an
individual is navigating for a car parking space. Second, we explore utilizing the CDN to
minimize the latency of transmitted data as well as enhance Internet content availability.
Consider a system that allows individuals to promptly find an available parking place on one
click of a key on a smart device. This system will significantly decrease the time devoted to
looking for a parking slot and inhibit vehicle parking violations.
Page14
EDGECOMPUTING
The smart parking system is usually powered via RFID, ultrasonic detector, and infrared
sensing units.
1)Flow of Execution: A common flow of execution works as follows for a smart parking
system.
4)Browse between randomly available parking slots, then select a preferable slot.
When a customer parks the car via navigation and confirms his parking, the time countdown
starts.On departure, the customer can pay any additional charge if he exceeds the allowed time.
1)Benefits: Smart parking may minimize traffic for an automobile navigating for a slot, can be
useful for many people and decrease vehicles emissions, making for an even more
environmentally friendly city. It can also boost accessibility for businesses and grocery stores
by enhanced optimization of available parking slots.
2)Future Scope:
Page15
EDGECOMPUTING
The system may be adjusted to integrate future self-driving automobiles and assure real- time
communication between several vehicles such that an individual possesses no interactive
burden with the system.
More efficient parking algorithms could be established for the optimal consumption of
resources, such as availability of slots and parking durations. For example, a deep learning
model can be trained for real- time space allocation.
A CDN is one of the most promising solutions to address the issue of massive web traffic, by
distributing many servers efficiently in different geographical locations, thereby delivering
web content in a faster way. The CDN is a special case of edge computing. Today, a lot of
Internet websites, such as Facebook, eBay, and Netflix, leverage the CDN architecture to
efficiently provide web content.
Advantages: There are many advantages for consumers under the CDN architecture.
● Website security improvement: a CDN with the help of distributed denial of service
(DDoS) mitigation can enhance and maintain the website security from DDoS attacks that
can severely interrupt and degrade the service accessibility.
● Faster website page loading: a CDN can be utilized to provide static web content, which
decreases the webpage load time.
● Botnet and spam defence: a CDN can be set up with firewall policies which obstruct
unwanted spamming and botnet probing against the system.
Page16
EDGECOMPUTING
● Enhancing global content availability: a CDN can manage massive traffic and hold up
against failure as compared with central services.
● Handling website traffic spikes: a CDN provides better load balancing between servers
and offers fast horizontal scaling.
We have described five potential applications of edge computing in the last section. To realize
the vision of edge computing, we argue that the systems and network community need to work
together. In this section, we will further summarize these challenges in detail and bring forward
some potential solutions and opportunities worth further research, including programmability,
naming, data abstraction, service management, privacy and security and optimization metrics.
Programmability
In cloud computing, users program their code and deploy them on the cloud. The cloud provider
is in charge to decide where the computing is conducted in a cloud. Users have zero or partial
knowledge of how the application runs. This is one of the benefits of cloud computing that the
infrastructure is transparent to the user. Usually, the program is written in one programing
language and compiled for a certain target platform, since the program only runs in the cloud.
However, in the edge computing, computation is offloaded from the cloud, and the edge nodes
are most likely heterogeneous platforms. In this case, the runtime of these nodes differ from each
other, and the programmer faces huge difficulties to write an application that may be deployed in
the edge computing paradigm. To address the programmability of edge computing, we propose
the concept of computing stream that is defined as a serial of functions/computing applied on the
data along the data propagation path. The functions/computing could be entire or partial
functionalities of an application, and the computing can occur anywhere on the path as long as
the application defines where the computing should be conducted. The computing stream is
software defined computing flow such that data can be processed in distributed and efficient
fashion on data generating devices, edge nodes, and the cloud environment. As defined in edge
computing, a lot of computing can be done at the edge instead of the centric cloud. In this case,
the computing stream can help the user to determine what functions/computing should be done
and how the data is propagated after the computing happened at the edge. The function/computing
distribution metric could be latency-driven, energy cost, TCO, and hardware/ software specified
limitations. The detailed cost model is discussed in Section IV-F. By deploying a computing
stream, we expect that data is computed as close as possible to the data source, and the data
Page17
EDGECOMPUTING
Naming
In edge computing, one important assumption is that the number of things is tremendously large.
At the top of the edge nodes, there are a lot of applications running, and each application has its
own structure about how the service is provided. Similar to all computer systems, the naming
scheme in edge computing is very important for programing, addressing, things identification,
and data communication. However, an efficient naming mechanism for the edge computing
paradigm has not been built and standardized yet. Edge practitioners usually needs to learn
various communication and network protocols in order to communicate with the heterogeneous
things in their system. The naming scheme for edge computing needs to handle the mobility of
things, highly dynamic network topology, privacy and security protection, as well as the
scalability targeting the tremendously large amount of unreliable things. Traditional naming
mechanisms such as DNS and uniform resource identifier satisfy most of the current networks
very well. However, they are not flexible enough to serve the dynamic edge network since
sometimes most of the things at edge could be highly mobile and resource constrained. Moreover,
for some resource constrained things at the edge of the network, IP based naming scheme could
be too heavy to support considering its complexity and overhead. New naming mechanisms such
as named data networking (NDN) [27] and Mobility First [28] could also be applied to edge
computing. NDN provide a hierarchically structured name for content/data centric network, and
it is human friendly for service management and provides good scalability for edge. However, it
would need extra proxy in order to fit into other communication protocols such as Bluetooth or
ZigBee, and so on. Another issue associated with NDN is security, since it is very hard to isolate
things hardware information with service providers. MobileFirst can separate name from network
address in order to provide better mobility support, and it would be very efficient if applied to
edge services where things are of highly mobility. Nerveless, a global unique identification
(GUID) needs to be used for naming is MobileFirst, and this is not required in related fixed
information aggregation service at the edge of the network such as home environment. Another
disadvantage of MobileFirst for edge is the difficulty in service management since GUID is not
human friendly.
Data Abstraction
Various applications can run on the edgesOS consuming data or providing service by
communicating through the air position indicators from the service management layer. Data
Page18
EDGECOMPUTING
abstraction has been well discussed and researched in the wireless sensor network and cloud
computing paradigm. However, in edge computing, this issue becomes more challenging. With
IoT, there would be a huge number of data generators in the network, and here we take a smart
home environment as an
example. In a smart home, almost all of the things will report data to the edgeOS, not to mention
the large number of things deployed all around the home. However, most of thethings at the edge
of the network, only periodically report sensed data to the gateway. For example, the thermometer
could report the temperature every minute, but this data will most likely only be consumed by the
real user several times a day. Another example could be a security camera in the home which
might keep recording and sending the video to the gateway, but the data will just be stored in the
database for a certain time with nobody actually consuming it, and then be flushed by the latest
video.
Service Management
In terms of service management at the edge of the network, we argue that the following four
fundamental features should be supported to guarantee a reliable system, including
differentiation, extensibility, isolation, and reliability. Differentiation: With the fast growth of
IoT deployment, we expected multiple services will be deployed at the edge of the network, such
as Smart Home. These services will have different priorities. For example, critical services such
as things diagnosis and failure alarm should be processed earlier than ordinary service. Health
related service, for example, fall detection or heart failure detection should also have a higher
priority compared with other service such as entertainment.
Optimization Metrics
In edge computing, we have multiple layers with different computation capability. Workload
allocation becomes a big issue. We need to decide which layer to handle the workload or how
many tasks to assign at each part. There are multiple allocation strategies to complete a workload,
for instances, evenly distribute the workload on each layer or complete as much as possible on
each layer. The extreme cases are fully operated on endpoint or fully operated on cloud. To choose
an optimal allocation strategy, we discuss several optimization metrics in this section, including
latency, bandwidth, energy and cost.
Latency: Latency is one of the most important metrics to evaluate the performance, especially in
interaction applications/services
Page19
EDGECOMPUTING
Bandwidth: From latency’s point of view, high bandwidth can reduce transmission time,
especially for large data.
Energy: Battery is the most precious resource for things at the edge of the network. For the
endpoint layer, offloading workload to the edge can be treated as an energy free method.
Cost: From the service providers’ perspective, e.g., YouTube, Amazon, etc., edge computing
provides them less latency and energy consumption, potential increased throughput and improved
user experience.
Page20
EDGECOMPUTING
CHAPTER 5
CONCLUSION
Nowadays, more and more services are pushed from the cloud to the edge of the network because
processing data at the edge can ensure shorter response time and better reliability. Moreover,
bandwidth could also be saved if a larger portion of data could be handled at the edge rather than
uploaded to the cloud. The burgeoning of IoT and the universalized mobile devices changed the role
of edge in the computing paradigm from data consumer to data producer/consumer. It would be more
efficient to process or massage data at the edge of the network.
In this paper, we came up with our understanding of edge computing, with the rationale that
computing should happen at the proximity of data sources. In this article, we investigated, highlighted,
and reported recent premier advances in edge computing technologies (e.g., fog computing, MEC,
and cloudlets) with respect to measuring their effect on IoT. Then, we categorized edge computing
literature by devising a taxonomy, which was used to uncover the premium features of edge
computing that can be beneficial to the IoT paradigm. We outlined a few key requirements for the
deployment of edge computing in IoT and discussed indispensable scenarios of edge computing in
IoT. Furthermore, several open research challenges to the successful deployment of edge computing
in IoT are identified and discussed.
We conclude that although the deployment of edge computing in IoT provides numerous benefits, the
convergence of these two computing paradigms brings about new issues that should be resolved in
the future.
Page21
EDGECOMPUTING
CHAPTER 6
REFERENCES
1] Edge Computing: Vision and Challenges,Weisong Shi, Fellow, IEEE, Jie Cao,
Student Member, IEEE, Quan Zhang, Student Member, IEEE, Youhuizi Li, and Lanyu Xu 2016
2]Secure Edge Computing in IoT Systems: Review and Case Studies, Mohammed Alrowaily
Department of Electrical Engineering University of South Florida, Zhuo Lu Department of
Electrical IEEE,2018
3]The Role of Edge Computing in Internet of Things , Najmul Hassan, Saira Gillani,Ejaz Ahmed
IEEE, Ibrar Yaqoob, and Muhammad Imran, IEEE,2018
4]Ala Al-Fuqaha, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE, Mehdi Mohammadi,
Student Member, IEEE, Mohammed Aledhari, Student Member, IEEE, and Moussa Ayyash,
Senior Member, IEEE,2015
5]E. K. Markakis et al., “Efficient Next Generation Emergency Communications over Multi-
Access Edge Computing,” IEEE Commune. Mag., vol. 55, no. 11, Nov. 2017
6]T. Taleb et al., “Mobile Edge Computing Potential in Making Cities Smarter,” IEEE Commune.
Mag., vol. 55, no. 3, Mar.2017
7]M. Satyanarayanan et al., “Edge Analytics in the Internet of Things,” IEEE Pervasive
Computing, vol. 14, no. 2, 2015
Page22
EDGECOMPUTING
Page26