CTP Synopsis
CTP Synopsis
ON
Bachelor of Engineering
(Third Semester)
In
COMPUTER SCIENCE & ENGINEERING
Session 2024-2025
Prescribed By
Dr. Babasaheb Ambedkar Technological University, Lonere (DBATU)
1
GROUP 17
Members:
Gaurav Bartine (CSEB349)
Mohammed Mustafa (CSEB350)
Shravani Trikolwar (CSEB351)
2
Abstract
Edge Computing is an emerging paradigm in distributed computing that processes data at the
edge of a network, closer to data sources and end-users, rather than relying solely on
centralized cloud servers. This method significantly reduces latency, enhances privacy, and
allows for real-time processing, making it ideal for applications such as IoT devices,
autonomous vehicles, and augmented reality. Traditional cloud computing involves data
transmission from devices to centralized servers for processing, which can lead to delays and
potential bandwidth limitations.
Edge computing mitigates these issues by distributing computational tasks to localized edge
devices or edge servers near the data source, enabling faster data processing and response
times, especially in scenarios that require instant decision-making, such as in healthcare
monitoring systems or autonomous driving.
The advantages of edge computing are manifold. First, it minimizes latency, ensuring that
data is processed without the delays typically associated with cloud data transmission. This
benefit is crucial for applications where milliseconds matter, such as remote surgeries or
financial trading platforms. Additionally, edge computing reduces bandwidth usage and
associated costs by processing data locally and transmitting only the relevant insights to the
cloud. This method also strengthens data privacy and security since data remains closer to its
source, thus reducing potential exposure to cyber threats during transmission.
Despite its advantages, edge computing presents certain challenges, including the need for
robust and reliable edge devices capable of handling computational workloads and the
complexity of managing a decentralized network. Security at the edge can also be complex to
implement effectively, requiring secure protocols and robust data encryption methods.
In conclusion, edge computing is set to redefine the landscape of data processing and is
essential for the next generation of applications that demand high-speed processing and
enhanced privacy. By bringing computation closer to where data is generated, edge
computing enables more resilient, responsive, and efficient systems, paving the way for
innovations across various industries.
3
Table of Contents
4
Introduction
In today’s digitally connected world, data generation and processing demands are escalating
at an unprecedented rate. With the rise of Internet of Things (IoT) devices, autonomous
systems, and smart technologies, traditional centralized computing models face challenges in
meeting the requirements for speed, efficiency, and privacy. Edge Computing addresses these
limitations by moving data processing closer to where data is generated—at the "edge" of the
network, rather than relying solely on centralized data centres.
The traditional model, known as cloud computing, involves sending data from devices like
sensors or cameras to remote servers where processing takes place, and then waiting for
results to be sent back. While effective for many applications, this method can introduce
delays, or "latency," which can be a critical limitation in time-sensitive situations, such as in
autonomous vehicles, industrial automation, or healthcare monitoring systems. Edge
computing counters this by processing data locally—at or near the source—thereby reducing
latency, conserving bandwidth, and enabling faster responses.
Edge computing works by deploying smaller data centres or processing capabilities at various
points within the network, such as routers, gateways, or directly on the IoT devices
themselves. This distributed approach allows for more efficient data management and enables
devices to make real-time decisions. For instance, a factory with a network of sensors can use
edge computing to monitor and respond to equipment conditions instantly, enhancing
productivity and reducing downtime.
One of the core benefits of edge computing is the enhancement of data privacy and security.
Since data is processed locally, sensitive information can often be managed and stored at the
device level, reducing exposure to potential cyber-attacks. Additionally, edge computing can
significantly reduce network congestion and bandwidth costs, as only processed insights,
rather than raw data, need to be sent to the central cloud.
However, implementing edge computing also presents challenges, such as ensuring consistent
and reliable performance across decentralized devices, managing the complex infrastructure,
and maintaining strong security measures. These challenges are actively being addressed as
edge computing continues to evolve and integrate with modern technologies, such as 5G
networks and AI-powered edge devices.
As industries increasingly adopt edge computing, its applications continue to expand. It is
transforming sectors like healthcare, manufacturing, transportation, and retail by enabling
faster and more intelligent systems. With the potential to drive the next wave of digital
innovation, edge computing is poised to become an essential component of the modern
computing landscape, providing a foundation for real-time data processing, enhanced user
experiences, and improved operational efficiency.
5
Aim & Objectives
Aim
To analyse the implementation and benefits of Edge Computing in enhancing data processing
efficiency, security, and real-time responsiveness by processing data closer to sources. The
project will explore how Edge Computing addresses latency, bandwidth, and privacy
challenges, particularly in IoT and time-sensitive applications.
Objectives
1. Implement Localized Data Processing:
Develop a model to process data locally at or near the source, minimizing latency,
optimizing bandwidth, and ensuring faster responses for critical applications.
2. Enhance Data Privacy and Security:
Handle sensitive data locally with encryption and secure access protocols at the edge
to improve privacy and reduce exposure to cyber threats.
3. Analyse Real-Time Performance Improvements:
Measure latency reduction and bandwidth efficiency achieved through local
processing to demonstrate edge computing's advantage in time-sensitive scenarios.
4. Address Network Management Challenges:
Mitigate challenges of distributed edge devices, including network reliability and
device synchronization, with protocols ensuring smooth operation across edge nodes.
5. Explore Cross-Industry Use Cases:
Document edge computing applications in healthcare, manufacturing, and smart
cities, emphasizing where edge computing has significant impacts.
6. Develop Recommendations for Future Integration:
Provide best practices for implementing edge computing with 5G, AI, and IoT,
supporting ongoing improvements in edge technology.
This project highlights Edge Computing’s potential to revolutionize data processing across
various industries, addressing modern computing needs for efficiency, security, and real-time
processing.
6
Methodology
Software Description:
• Edge Computing Framework: Apache Kafka or EdgeX Foundry
• Data Processing Tools: Apache Spark or TensorFlow
• Security Protocols: AES, RSA for encryption; MQTT, HTTPS for secure
communication
• Processor: Intel(R) Core (TM) i5-6300U
• User Interface: React or Angular for frontend development
• Operating System Compatibility: Windows, Linux, macOS
Hardware Description:
• Edge Devices:
o Device Type: Raspberry Pi or NVIDIA Jetson modules
o Processor: Quad-core processor
o RAM: Minimum of 4 GB
• Networking Equipment:
o Type: Routers and switches
o Requirements: High throughput and low latency
• Cloud Infrastructure:
o Provider: AWS, Google Cloud, or Azure
o Purpose: Additional processing power and storage
• Storage Solutions:
o Type: SSD or HDD for local data storage
o Capacity: Minimum of 256 GB with scalability options
7
Module description
8
Algorithm Description
The Edge Computing system employs various algorithms to enhance data processing,
improve decision-making, and optimize resource utilization. Below are key algorithms that
facilitate the core functionalities of the system:
1. Data Collection Algorithm
This algorithm is responsible for gathering data from multiple edge devices and
sensors in real time.
o Input: Device data streams.
o Process:
1. Initialize data collection modules for each device.
2. Continuously monitor device status and data output.
3. Store incoming data in a temporary buffer.
4. Filter and preprocess data to remove noise.
o Output: Cleaned data ready for analysis.
3. Decision-Making Algorithm
This algorithm assists in making real-time decisions based on processed data.
o Input: Analytics results from the processing module.
o Process:
1. Define thresholds for various metrics (e.g., temperature, humidity).
2. Compare analytics results against defined thresholds.
9
3. Trigger alerts or actions (e.g., adjust settings, notify users) based on
conditions met.
o Output: Real-time decisions or alerts.
4. Resource Management Algorithm
This algorithm optimizes the utilization of edge devices and cloud resources.
o Input: Device status, processing load, and data transfer rates.
o Process:
1. Monitor current resource usage and availability.
2. Balance loads across devices to prevent bottlenecks.
3. Allocate resources dynamically based on demand (e.g., scale up/down
as needed).
o Output: Optimized resource allocation.
10
Database description
The database for the Edge Computing system is designed to efficiently store, manage, and
retrieve large volumes of data generated from various edge devices. It ensures data integrity,
consistency, and availability, allowing real-time analytics and decision-making.
1. Database Type
The system utilizes a Relational Database Management System (RDBMS), such as
MySQL or PostgreSQL, to facilitate structured data storage and complex queries.
2. Database Schema
The database schema consists of several key tables, each serving distinct functions:
• Users Table
o Purpose: Stores user information and access credentials.
o Fields:
▪ user_id (Primary Key)
▪ username (Unique)
▪ password_hash
▪ email
▪ role (User, Admin)
• Devices Table
o Purpose: Maintains records of all edge devices connected to the system.
o Fields:
▪ device_id (Primary Key)
▪ device_name
▪ device_type
▪ location
▪ status (Active, Inactive)
• Data Collection Table
o Purpose: Captures data collected from edge devices over time.
o Fields:
▪ data_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ timestamp
11
▪ data_value
• Analytics Table
o Purpose: Stores results from data processing and analytics.
o Fields:
▪ analytics_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ result
▪ analysis_timestamp
• Alerts Table
o Purpose: Records alerts generated from the decision-making algorithm.
o Fields:
▪ alert_id (Primary Key)
▪ device_id (Foreign Key referencing Devices)
▪ alert_message
▪ alert_timestamp
3. Data Integrity and Constraints
To ensure data integrity, the database employs:
• Primary Keys: Uniquely identifies each record in a table.
• Foreign Keys: Maintains relationships between tables, ensuring data consistency
across the schema.
• Unique Constraints: Prevents duplicate entries, especially in the Users table.
4. Backup and Recovery
Regular backups are scheduled to prevent data loss. The database system utilizes transaction
logs to support point-in-time recovery, ensuring minimal downtime and data integrity in case
of failures.
5. Security Measures
• User Authentication: Secure access is enforced using hashed passwords and role-
based access controls.
• Data Encryption: Sensitive data, such as user credentials, is encrypted both at rest
and in transit to prevent unauthorized access.
6. Performance Optimization
The database employs indexing strategies on frequently queried fields to enhance retrieval
speeds. Query optimization techniques are also utilized to ensure efficient processing of
complex queries.
12
UML diagram /class/E-R diagram /Dataflow
1. UML Diagram
The UML diagram for an edge computing system can include various components, such as
edge devices, cloud services, and user interfaces. The use case and class diagrams are
particularly relevant here.
Use Case Diagram
This diagram illustrates the interactions between users (actors) and the edge computing
system. Key actors may include:
• User: Accesses data and applications.
• Edge Device: Performs processing close to the data source.
• Cloud Service: Provides additional computational resources and storage.
Use Case Examples:
• Data Processing: The edge device processes data locally.
• Data Storage: Data is stored both locally and in the cloud.
• User Interaction: Users access applications via a web or mobile interface.
13
2. Entity-Relationship (E-R) Diagram
The E-R diagram models the relationships between key entities in the edge computing
system.
Entities:
• Edge Device
• User
• Data
• Application
Relationships:
• A User can interact with multiple Applications.
• An Edge Device processes multiple Data entries.
• Each Application can be hosted on one or more Edge Devices.
Fig 2. ER Diagram
14
3. Data Flow Diagram (DFD)
A Data Flow Diagram illustrates how data moves through the edge computing system,
showing processes, data stores, and external entities.
Processes:
• Data Collection: Gathering data from sensors or user inputs.
• Data Processing: Performing computations on collected data.
• Data Storage: Storing processed data locally or in the cloud.
• User Interaction: Providing data access to users.
15
Future Scopes
Edge computing is poised to transform various sectors in the coming years. Here are key
areas of future development:
3. Autonomous Systems
Edge computing will be vital for autonomous systems, such as self-driving cars, requiring
immediate data processing from sensors. This enables faster responses and increased safety.
4. 5G Connectivity
The deployment of 5G will enhance edge computing by providing low latency and high
bandwidth, facilitating applications like augmented reality and seamless communication
between devices.
5. Edge Analytics
Real-time data analysis at the edge will allow organizations to derive immediate insights,
optimizing operations in sectors like retail and manufacturing without relying on centralized
cloud processing.
8. Environmental Sustainability
By minimizing data transmission to the cloud, edge computing can lower energy
consumption and support more sustainable business practices.
16
Conclusion
17