0% found this document useful (0 votes)
30 views17 pages

CTP Synopsis

Uploaded by

vinayakjivtode84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views17 pages

CTP Synopsis

Uploaded by

vinayakjivtode84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

CRITICAL THINKING PROJECT SYNOPSIS

ON

“EDGE COMPUTING & ITS ROLE IN IoT”


A Critical thinking Project synopsis submitted in partial fulfilment of the
requirement for the award of Degree of

Bachelor of Engineering
(Third Semester)
In
COMPUTER SCIENCE & ENGINEERING
Session 2024-2025
Prescribed By
Dr. Babasaheb Ambedkar Technological University, Lonere (DBATU)

Subject: BTCOS 307: SEMINAR 1

Seminar In-Charge Submitted By

Prof. Sachin Dhawas Group 17

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


RAJIV GANDHI COLLEGE OF ENGINEERING
RESEARCH & TECHNOLOGY, CHANDRAPUR

1
GROUP 17

Members:
Gaurav Bartine (CSEB349)
Mohammed Mustafa (CSEB350)
Shravani Trikolwar (CSEB351)

2
Abstract

Edge Computing is an emerging paradigm in distributed computing that processes data at the
edge of a network, closer to data sources and end-users, rather than relying solely on
centralized cloud servers. This method significantly reduces latency, enhances privacy, and
allows for real-time processing, making it ideal for applications such as IoT devices,
autonomous vehicles, and augmented reality. Traditional cloud computing involves data
transmission from devices to centralized servers for processing, which can lead to delays and
potential bandwidth limitations.

Edge computing mitigates these issues by distributing computational tasks to localized edge
devices or edge servers near the data source, enabling faster data processing and response
times, especially in scenarios that require instant decision-making, such as in healthcare
monitoring systems or autonomous driving.

The advantages of edge computing are manifold. First, it minimizes latency, ensuring that
data is processed without the delays typically associated with cloud data transmission. This
benefit is crucial for applications where milliseconds matter, such as remote surgeries or
financial trading platforms. Additionally, edge computing reduces bandwidth usage and
associated costs by processing data locally and transmitting only the relevant insights to the
cloud. This method also strengthens data privacy and security since data remains closer to its
source, thus reducing potential exposure to cyber threats during transmission.

Despite its advantages, edge computing presents certain challenges, including the need for
robust and reliable edge devices capable of handling computational workloads and the
complexity of managing a decentralized network. Security at the edge can also be complex to
implement effectively, requiring secure protocols and robust data encryption methods.

In conclusion, edge computing is set to redefine the landscape of data processing and is
essential for the next generation of applications that demand high-speed processing and
enhanced privacy. By bringing computation closer to where data is generated, edge
computing enables more resilient, responsive, and efficient systems, paving the way for
innovations across various industries.

Keywords: Edge Computing, Distributed Computing, IoT, Real-time Processing, Data


Privacy

3
Table of Contents

Sr. no. Title Page no.


1. Introduction 5
2. Aim and Objective 6
3. Methodology: Software and Hardware 7
4. Module description 8
5. Algorithm description 9
6. Database description 11
7. UML diagram /class/E-R diagram /Dataflow 13
8. Future Scope 16
9. Conclusion 17

4
Introduction

In today’s digitally connected world, data generation and processing demands are escalating
at an unprecedented rate. With the rise of Internet of Things (IoT) devices, autonomous
systems, and smart technologies, traditional centralized computing models face challenges in
meeting the requirements for speed, efficiency, and privacy. Edge Computing addresses these
limitations by moving data processing closer to where data is generated—at the "edge" of the
network, rather than relying solely on centralized data centres.
The traditional model, known as cloud computing, involves sending data from devices like
sensors or cameras to remote servers where processing takes place, and then waiting for
results to be sent back. While effective for many applications, this method can introduce
delays, or "latency," which can be a critical limitation in time-sensitive situations, such as in
autonomous vehicles, industrial automation, or healthcare monitoring systems. Edge
computing counters this by processing data locally—at or near the source—thereby reducing
latency, conserving bandwidth, and enabling faster responses.
Edge computing works by deploying smaller data centres or processing capabilities at various
points within the network, such as routers, gateways, or directly on the IoT devices
themselves. This distributed approach allows for more efficient data management and enables
devices to make real-time decisions. For instance, a factory with a network of sensors can use
edge computing to monitor and respond to equipment conditions instantly, enhancing
productivity and reducing downtime.
One of the core benefits of edge computing is the enhancement of data privacy and security.
Since data is processed locally, sensitive information can often be managed and stored at the
device level, reducing exposure to potential cyber-attacks. Additionally, edge computing can
significantly reduce network congestion and bandwidth costs, as only processed insights,
rather than raw data, need to be sent to the central cloud.
However, implementing edge computing also presents challenges, such as ensuring consistent
and reliable performance across decentralized devices, managing the complex infrastructure,
and maintaining strong security measures. These challenges are actively being addressed as
edge computing continues to evolve and integrate with modern technologies, such as 5G
networks and AI-powered edge devices.
As industries increasingly adopt edge computing, its applications continue to expand. It is
transforming sectors like healthcare, manufacturing, transportation, and retail by enabling
faster and more intelligent systems. With the potential to drive the next wave of digital
innovation, edge computing is poised to become an essential component of the modern
computing landscape, providing a foundation for real-time data processing, enhanced user
experiences, and improved operational efficiency.

5
Aim & Objectives

Aim
To analyse the implementation and benefits of Edge Computing in enhancing data processing
efficiency, security, and real-time responsiveness by processing data closer to sources. The
project will explore how Edge Computing addresses latency, bandwidth, and privacy
challenges, particularly in IoT and time-sensitive applications.

Objectives
1. Implement Localized Data Processing:
Develop a model to process data locally at or near the source, minimizing latency,
optimizing bandwidth, and ensuring faster responses for critical applications.
2. Enhance Data Privacy and Security:
Handle sensitive data locally with encryption and secure access protocols at the edge
to improve privacy and reduce exposure to cyber threats.
3. Analyse Real-Time Performance Improvements:
Measure latency reduction and bandwidth efficiency achieved through local
processing to demonstrate edge computing's advantage in time-sensitive scenarios.
4. Address Network Management Challenges:
Mitigate challenges of distributed edge devices, including network reliability and
device synchronization, with protocols ensuring smooth operation across edge nodes.
5. Explore Cross-Industry Use Cases:
Document edge computing applications in healthcare, manufacturing, and smart
cities, emphasizing where edge computing has significant impacts.
6. Develop Recommendations for Future Integration:
Provide best practices for implementing edge computing with 5G, AI, and IoT,
supporting ongoing improvements in edge technology.

This project highlights Edge Computing’s potential to revolutionize data processing across
various industries, addressing modern computing needs for efficiency, security, and real-time
processing.

6
Methodology

Software Description:
• Edge Computing Framework: Apache Kafka or EdgeX Foundry
• Data Processing Tools: Apache Spark or TensorFlow
• Security Protocols: AES, RSA for encryption; MQTT, HTTPS for secure
communication
• Processor: Intel(R) Core (TM) i5-6300U
• User Interface: React or Angular for frontend development
• Operating System Compatibility: Windows, Linux, macOS

Hardware Description:
• Edge Devices:
o Device Type: Raspberry Pi or NVIDIA Jetson modules
o Processor: Quad-core processor
o RAM: Minimum of 4 GB
• Networking Equipment:
o Type: Routers and switches
o Requirements: High throughput and low latency
• Cloud Infrastructure:
o Provider: AWS, Google Cloud, or Azure
o Purpose: Additional processing power and storage
• Storage Solutions:
o Type: SSD or HDD for local data storage
o Capacity: Minimum of 256 GB with scalability options

7
Module description

Edge Computing System Modules


The Edge Computing system consists of critical modules that enhance data processing
efficiency and reduce latency. Each module fulfils a specific function, contributing to the
overall effectiveness of edge computing solutions.
1. Data Acquisition and Processing
Manages local data collection and analysis to enable real-time insights.
• Data Collection: Gathers information from edge devices.
• Real-Time Processing: Analyses data locally to minimize response times.
• Data Filtering: Reduces bandwidth usage by filtering unnecessary data.
2. Edge Device Management
Oversees the deployment and management of edge devices.
• Device Configuration: Remote setup and updates of devices.
• Monitoring: Tracks device health and performance.
• Scalability: Supports adding new devices as needed.
3. Networking and Communication
Facilitates efficient data transfer between edge devices and cloud services.
• Protocol Management: Utilizes MQTT and HTTP for communication.
• Data Transmission: Ensures secure data transfer to reduce latency.
• Load Balancing: Distributes traffic for optimal performance.
4. Security and Privacy
Protects data integrity and user privacy.
• Data Encryption: Secures data during transfer and storage.
• Access Control: Implements user authentication mechanisms.
• Threat Detection: Monitors for security breaches.
5. Integration with Cloud Services
Enables seamless integration for enhanced capabilities.
• Hybrid Architecture: Supports a mix of edge and cloud resources.
• Data Syncing: Ensures consistency between edge and cloud data.
• Backup Solutions: Offers cloud-based backup options.
6. Analytics and Reporting
Provides tools for analyzing edge-generated data.
• Real-Time Analytics: Delivers insights for immediate decision-making.
• Reporting Tools: Generates usage and performance reports.
• Dashboard Visualization: Offers intuitive monitoring dashboards.
7. User Interface
The user-friendly platform for system interaction.
• User Dashboard: Displays data and device status.
• Admin Console: Management tools for administrators.
• Error Messaging: Provides clear notifications for users.

8
Algorithm Description

The Edge Computing system employs various algorithms to enhance data processing,
improve decision-making, and optimize resource utilization. Below are key algorithms that
facilitate the core functionalities of the system:
1. Data Collection Algorithm
This algorithm is responsible for gathering data from multiple edge devices and
sensors in real time.
o Input: Device data streams.
o Process:
1. Initialize data collection modules for each device.
2. Continuously monitor device status and data output.
3. Store incoming data in a temporary buffer.
4. Filter and preprocess data to remove noise.
o Output: Cleaned data ready for analysis.

2. Data Processing Algorithm


This algorithm processes the collected data locally to derive insights and reduce the
need for cloud processing.
o Input: Cleaned data from the collection module.
o Process:
1. Apply real-time analytics using predefined metrics.
2. Use machine learning models to detect patterns and anomalies.
3. Summarize results and store significant findings.
o Output: Processed data and analytics results.

3. Decision-Making Algorithm
This algorithm assists in making real-time decisions based on processed data.
o Input: Analytics results from the processing module.
o Process:
1. Define thresholds for various metrics (e.g., temperature, humidity).
2. Compare analytics results against defined thresholds.

9
3. Trigger alerts or actions (e.g., adjust settings, notify users) based on
conditions met.
o Output: Real-time decisions or alerts.
4. Resource Management Algorithm
This algorithm optimizes the utilization of edge devices and cloud resources.
o Input: Device status, processing load, and data transfer rates.
o Process:
1. Monitor current resource usage and availability.
2. Balance loads across devices to prevent bottlenecks.
3. Allocate resources dynamically based on demand (e.g., scale up/down
as needed).
o Output: Optimized resource allocation.

5. Data Transmission Algorithm


This algorithm manages the secure transfer of data between edge devices and the
cloud.
o Input: Processed data and commands.
o Process:
1. Establish secure communication channels using protocols like MQTT
or HTTPS.
2. Compress data to reduce bandwidth usage.
3. Transmit data to the cloud for long-term storage and further analysis.
o Output: Successfully transmitted data packets.

6. Security Management Algorithm


This algorithm ensures the security and integrity of the data and devices in the edge
network.
o Input: User credentials and access requests.
o Process:
1. Authenticate users using multi-factor authentication.
2. Monitor device activity for unusual patterns or potential threats.
3. Encrypt sensitive data before transmission and storage.
o Output: Secure data and verified user access.

10
Database description

The database for the Edge Computing system is designed to efficiently store, manage, and
retrieve large volumes of data generated from various edge devices. It ensures data integrity,
consistency, and availability, allowing real-time analytics and decision-making.
1. Database Type
The system utilizes a Relational Database Management System (RDBMS), such as
MySQL or PostgreSQL, to facilitate structured data storage and complex queries.
2. Database Schema
The database schema consists of several key tables, each serving distinct functions:
• Users Table
o Purpose: Stores user information and access credentials.
o Fields:
▪ user_id (Primary Key)
▪ username (Unique)
▪ password_hash
▪ email
▪ role (User, Admin)
• Devices Table
o Purpose: Maintains records of all edge devices connected to the system.
o Fields:
▪ device_id (Primary Key)
▪ device_name
▪ device_type
▪ location
▪ status (Active, Inactive)
• Data Collection Table
o Purpose: Captures data collected from edge devices over time.
o Fields:
▪ data_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ timestamp

11
▪ data_value
• Analytics Table
o Purpose: Stores results from data processing and analytics.
o Fields:
▪ analytics_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ result
▪ analysis_timestamp
• Alerts Table
o Purpose: Records alerts generated from the decision-making algorithm.
o Fields:
▪ alert_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ alert_message
▪ alert_timestamp
3. Data Integrity and Constraints
To ensure data integrity, the database employs:
• Primary Keys: Uniquely identifies each record in a table.
• Foreign Keys: Maintains relationships between tables, ensuring data consistency
across the schema.
• Unique Constraints: Prevents duplicate entries, especially in the Users table.
4. Backup and Recovery
Regular backups are scheduled to prevent data loss. The database system utilizes transaction
logs to support point-in-time recovery, ensuring minimal downtime and data integrity in case
of failures.
5. Security Measures
• User Authentication: Secure access is enforced using hashed passwords and role-
based access controls.
• Data Encryption: Sensitive data, such as user credentials, is encrypted both at rest
and in transit to prevent unauthorized access.
6. Performance Optimization
The database employs indexing strategies on frequently queried fields to enhance retrieval
speeds. Query optimization techniques are also utilized to ensure efficient processing of
complex queries.

12
UML diagram /class/E-R diagram /Dataflow

1. UML Diagram
The UML diagram for an edge computing system can include various components, such as
edge devices, cloud services, and user interfaces. The use case and class diagrams are
particularly relevant here.
Use Case Diagram
This diagram illustrates the interactions between users (actors) and the edge computing
system. Key actors may include:
• User: Accesses data and applications.
• Edge Device: Performs processing close to the data source.
• Cloud Service: Provides additional computational resources and storage.
Use Case Examples:
• Data Processing: The edge device processes data locally.
• Data Storage: Data is stored both locally and in the cloud.
• User Interaction: Users access applications via a web or mobile interface.

Fig 1. UML Diagram

13
2. Entity-Relationship (E-R) Diagram
The E-R diagram models the relationships between key entities in the edge computing
system.
Entities:
• Edge Device
• User
• Data
• Application
Relationships:
• A User can interact with multiple Applications.
• An Edge Device processes multiple Data entries.
• Each Application can be hosted on one or more Edge Devices.

Fig 2. ER Diagram

14
3. Data Flow Diagram (DFD)
A Data Flow Diagram illustrates how data moves through the edge computing system,
showing processes, data stores, and external entities.
Processes:
• Data Collection: Gathering data from sensors or user inputs.
• Data Processing: Performing computations on collected data.
• Data Storage: Storing processed data locally or in the cloud.
• User Interaction: Providing data access to users.

Fig 3. DFD diagram

15
Future Scopes
Edge computing is poised to transform various sectors in the coming years. Here are key
areas of future development:

1. Enhanced IoT Integration


As IoT devices proliferate, edge computing will manage and process data locally, reducing
latency and enabling real-time decision-making in sectors like smart cities and healthcare.

2. Improved Data Security


Edge computing enhances data security by keeping sensitive information closer to its source,
minimizing the risk of breaches. Future developments will focus on stronger encryption and
access controls.

3. Autonomous Systems
Edge computing will be vital for autonomous systems, such as self-driving cars, requiring
immediate data processing from sensors. This enables faster responses and increased safety.

4. 5G Connectivity
The deployment of 5G will enhance edge computing by providing low latency and high
bandwidth, facilitating applications like augmented reality and seamless communication
between devices.

5. Edge Analytics
Real-time data analysis at the edge will allow organizations to derive immediate insights,
optimizing operations in sectors like retail and manufacturing without relying on centralized
cloud processing.

6. Scalability and Cost Efficiency


Edge computing offers scalable solutions that can grow with business needs. Organizations
can deploy edge devices as necessary, reducing reliance on extensive cloud infrastructure.

7. AI and Machine Learning Collaboration


Combining edge computing with AI and machine learning will enable adaptive applications
that improve efficiency and provide personalized experiences through local data processing.

8. Environmental Sustainability
By minimizing data transmission to the cloud, edge computing can lower energy
consumption and support more sustainable business practices.

16
Conclusion

In conclusion, edge computing represents a significant advancement in the realm of


technology, transforming how data is processed, managed, and utilized. By enabling data
processing closer to the source, edge computing reduces latency, enhances security, and
improves overall system efficiency. The modular architecture of systems, such as those for
banking with transaction rollback and exception handling, demonstrates the practical
applications of edge computing in ensuring reliability and security.
As we look to the future, the integration of edge computing with the Internet of Things (IoT),
5G connectivity, and advanced analytics will create new opportunities for innovation across
various sectors. Enhanced data security measures and autonomous systems will thrive in edge
environments, providing real-time responsiveness and greater control over sensitive
information.
Moreover, the collaboration between edge computing, artificial intelligence, and machine
learning will facilitate the development of intelligent applications that adapt to user needs and
improve operational efficiency. This synergy will contribute to more sustainable practices by
minimizing energy consumption and optimizing resource usage.
Ultimately, embracing edge computing will be essential for organizations aiming to remain
competitive in an increasingly digital landscape. By harnessing its capabilities, businesses
can unlock new levels of performance, drive innovation, and enhance user experiences while
addressing the challenges of data security and processing efficiency.

17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy