Tech Report PDF 50
Tech Report PDF 50
Tech Report PDF 50
JNANASANGAMA, BELAGAVI-590018
A seminar report On
“EDGE COMPUTING IN IOT”
Submitted in partial fulfillment of the requirements for the award of degree of
Bachelor of Engineering
in
Computer Science and Engineering
Submitted by
K SHIVARUDRA GOUDA
4KM20CS017
2023-24
CERTIFICATE
2023-24
Principal
Dr. Raghu Chand R, M. Tech, Ph.D
KIT, Mangalore
1. 1.
2. 2.
DECLARATION
I Shivarudra gouda hereby declare that the report presented in this seminar entitled
“EDGE COMPUTING IN IOT” is an authentic collection of information that has
been carried out independently in my 8th semester Computer Science and Engineering at
Karavali Institute of Technology under the guidance of Ms. Bhagyashree M.
Date: K SHIVARUDRAGOUDA
Place:Mangalore (4KM20CS017)
i
ACKNOWLEDGMENT
I would like to convey my heart full thanks to Dr. B JANA, Head of the Department,
Computer Science and Engineering for giving me the opportunity to embark upon this
topic and for their continuous encouragement throughout the preparation.
I am also thankful to the respected Dr. Raghu Chand, Principal and faculty members
of Karavali Institute of Technology, Mangalore for providing all the facilities that
helped me in timely completion of this seminar report.
Sincerely,
K SHIVARUDRAGOUDA
(4KM20CS017)
ii
CONTENTS
DECLARATION i
ACKNOWLEDGMENT ii
CONTENTS iii
LIST OF FIGURES iv
INTRODUCTION 1-2
CHAPTER 1
CHAPTER 2 TERMS AND DEFINITION 3-4
CHAPTER 4 WORKING 7
CHAPTER 7 CONCLUSION 19
REFERENSES 20
iii
LIST OF FIGURES
iv
EDGE COMPUTING IN IOT 2023-24
CHAPTER-1
INTRODUCTION
Internet of Things (IOT) was first introduced to the community in 1999 for supply
chain management, and then the concept of “making a computer sense information
without the aid of human intervention” was widely adapted to other fields such as
healthcare, home, environment, and transports. Now with IOT, we will arrive in the post-
cloud era, where there will be a large quality of data generated by things that are
immersed in our daily life, and a lot of applications will also be deployed at the edge to
consume these data.
Some IOT applications might require very short response time, some might involve
private data, and some might produce a large quantity of data which could be a heavy
load for networks. Cloud computing is not efficient enough to support these applications.
With the push from cloud services and pull from IOT, we envision that the edge of the
network is changing from data consumer to data producer as well as a data consumer.
In cloud computing, all data should be sent to a central server where the majority of
computing is carried out. Then, the results of that computation need to be returned to
these gadgets and sensors.The direction of future computing will go beyond
conventional computing. IoT systems are integrated into day-to-day lives quickly.
Physical devices and endpoints include wearable fitness bands, smart vehicles, sensor
units, and actuators, which represents a massive future jump in the scope of data
manufacturing.
Edge Computing aims to process the data very close to the source where it is produced.
Many electronic devices are currently connected to the Internet of Things which will
produce a massive volume of data, and it might be even larger with mobile phones in a
5G network. Cisco Global Cloud Index estimated in 2019 that IOT devices will
Edge Computing refers to processing the data on the device and very close to the device.
This massive volume of data might be hard to handle entirely on the Cloud Computing
network. To face this challenge, Edge Computing offers the full computation or part of
the computation that can process the data at the Edge network, which is in very close
proximity to the data source. It enables low latency, faster response, and more
comprehensive data analysis.
Usually, devices connected to the IOT provide the service in healthcare, smart cities,
smart grid, transportation, multimedia, and security. In general, those services depend
on AI methodologies, which are compute intensive and use massive data. A few years
back, these devices usually sent the data to the cloud or local data centre to process the
data. With ongoing development in Edge Computing, the part of the data at the Edge
node can be processed, thus minimizing the application’s overall latency.
Edge: What the edge is depends on the use case. In a telecommunications field, perhaps
the edge is a cell phone or maybe it’s a cell tower. In an automotive scenario, the edge
of the network could be a car. In manufacturing, it could be a machine on a shop floor;
in enterprise IT, the edge could be a laptop.
Edge server: Edge servers can be defined as “a computer for running middleware or
applications that sits close to the edge of the network, where the digital world meets the
real world. Edge servers are put in warehouses, distribution centers and factories, as
opposed to corporate headquarter”.
Edge devices: These can be any device that produces data. These could be sensors,
industrial machine or other devices that produce or collect data.
Mobile edge computing: This refers to the buildout of edge computing systems in
telecommunications systems, particularly 5G scenarios. Mobile edge computing is a
network architecture concept that enables cloud computing capabilities and an IT
service environment at the edge of the cellular network. The basic idea behind MEC
Edge gateway: A gateway is the buffer between where edge computing processing is
done and the broader fog network. The gateway is the window into the larger
environment beyond the edge of the network.
Fat client: Software that can do some data processing in edge devices. This is opposed
to a thin client, which would merely transfer data.
Edge computing is a “mesh network of micro data centers that process or store critical
data locally and push all received data to a central data center or cloud storage
repository, in a footprint of less than 100 square feet,” according to research firm IDC.
It is typically referred to in IoT use cases, where edge devices would collect data –
sometimes massive amounts of it – and send it all to a data center or cloud for
processing. Edge computing triage's the data locally so some of it is processed locally,
reducing the back haul traffic to the central repository.
Typically, this is done by the IoT devices transferring the data to a local device that
includes compute, storage and network connectivity in a small form factor. Data is
processed at the edge, and all or a portion of it is sent to the central processing or
storage repository in a corporate data center, co-location facility or IaaS cloud.
In the context of IIoT, 'edge' refers to the computing infrastructure that exists close to
the sources of data, for example, industrial machines (e.g. wind turbine, magnetic
resonance (MR) scanner, undersea blowout preventers), industrial controllers such as
SCADA systems, and time series databases aggregating data from a variety of
equipment and sensors. These devices typically reside away from the centralize
computing available in the cloud.
The role of edge computing to date has mostly been used to ingest, store, filter, and send
data to cloud systems. We are at a point in time, however, where these computing
systems are packing more compute, storage, and analytic power to consume and act the
data at the machine location. This capability will be more than valuable to industrial
organizations it will be indispensable.
The target end-user is any Internet client making use of commercial Internet application
services. Edge computing imposes certain limitations on the choices of technology
platforms, applications or services, all of which need to be specifically developed or
configured for edge computing.
•Cloud Computing: This refers to computing resources (small cluster) connected via
WLAN to the end-users. In general, it can be considered as a “data centre in a box”
which provides support (computing and storage) to the end-users over the WLAN
network. Cloudlet Computing is based on three layers: the component layer, the node
layer, and the cloudlet layer. This is designed to have higher bandwidth, thus lowering
the latency for the applications.
•IoT (Internet of Things):contains a large set of devices and sensors that produce a
huge volume of data. These also exchange the data through a modern communication
network and monitor and control the infrastructure.
Typically, end-users at the Edge use the IoT devices and sensors. In general, Edge
Computing involves complex or heterogeneous architecture. It is hard to ultimately
make use of this complex architecture for some Edge Computing applications. The
following list provides more description about some of the important software platforms
in Edge Computing.
Data sources: As the input, any endpoint which records and collects data from clients
or its environments is described as a data source.
Artificial intelligence: As the processing function, it is the main phase after data
collected to uncover practical observations, locate patterns and trends, produce
individualized recommendations, and improve the performance based on machine
learning or data analytics models
Anonymity: an individual may make use of a resource without revealing his identity.
Confidentiality: assuring only the data proprietor and an individual can access the
personal information in the edge computing. It protects against unapproved parties’
access to the data when the individual’s data is transferred and also collected in edge or
core network frame work, as well as when the data is kept or handled in edge or cloud
nodes.
Integrity: assuring the proper and steady transmission of data to the accredited
individual without unauthorized modification of the data. Privacy of individuals can be
impacted due to the lack of integrity measures.
Availability: ensuring the accredited party manages to access the edge services in any
regions based on individuals’ needs. This also implies that an individual’s data held in
edge or cloud nodes along with the cipher text format can be handled under various
practical needs.
SMS texting and voice-based: a code received by an SMS text; and reading the
numbers aloud via an automated voice call for secure login.
Hardware tokens: a small hardware device with a built-in screen to generate a one-
time password (OTP) for each transaction.
Push notification: a pop-up “push” message that turns up on a user’ device through the
internet to validate the identity of the user as a second-factor authentication.
A parking lot management system can be a one-stop shop, uniting parking facility
managers, law enforcement agencies, drivers, and other stakeholders into a connected
network. Parties affected by the transformation of parking management make
contribution to the overall well-being of urban communities by connecting with each
other, ask and answer questions.
The screen displays the available and occupied parking Spaces. Iot platforms,
ideally cloud-based, should aggregate sensor data and turn it into a clear and
concise view of the facility’s parking space occupancy.
Monitor parking occupancy in real time from any PC or smartphone. Drivers should
be able to see how many free parking Spaces are available near all parking facilities
Usecases:
Autonomous driving can be classified into six different levels, from traditional vehicles
being Level 0 to fully autonomous vehicles being Level 5. Additionally, within this
classification, Advanced Driver-Assistance Systems (ADAS) start at Level 1 and extend
to Level 4. ADAS offers semi-autonomous features to the vehicle and is the first step
towards fully autonomous vehicles.
However, the autonomous vehicle does have to keep reading the conditions of the road
and needs to keep transmitting data back-and-forth, between itself and a data center. By
keeping this communication in-place with a data center, it allows the autonomous
vehicle to learn and make decisions as it drives.In contrast, advanced driver-assistance
programs (ADAS) or semi-autonomous vehicles, can rely on GPS and Internet of
Things information to function.
Ultimately, to enable autonomous vehicles to perform at their highest level, they need to
run on a well-built 5G network. In turn, digital infrastructure supports this 5G network.
However, the secondary, state and county roads are more difficult to cover, from an
economic standpoint. Therefore, it will take time for 100% of roads in the United States
to have coverage by towers. Indeed, for autonomous vehicles to fully function, they
need full coverage of roads by towers.
This is where Edge computing comes in, with experts predicting that 5G will need to
rely on Edge computing to reach these impressive targets.By installing data processing
for 5G on the Edge, there is a significant reduction in the time it takes to process
data. Edge Computing, operating at the network’s edge, stores all its data locally and
doesn’t need to interact with the cloud. It has set commands for the jobs it needs to
perform.
Data is processed in real-time by putting 5G data processing on the Edge of the network.
Additionally, the security advantage that the Edge offers gives the 5G network further
Using the cloud for such work will quickly become expensive, not to mention slower.
As a result, consumer experience will deteriorate, and 5G will not be able to handle
processing responsibilities using the cloud alone. Having the entire system travel
through local Edge networks, where the information can be picked apart and
rationalized before it’s sent to a centralized cloud, vastly improves the processing
procedure.
This further incentivizes application creators to use the new 5G network, thus allowing
it to grow alongside Edge Computing.
CONCLUSION
In this report, I came up with the understanding of edge computing, with the rationale
that computing should happen at the proximity of data sources. In this report, we
investigated,highlighted,and reported recent primer advances in edge computing
technologies(e.g., fog computing, MEC and cloudlets) with respect to measuring their
affect on IoT.Then, we categorized edge computing literature by devising a taxonomy,
which was used to uncover the premium features of edge computing that can be
beneficial to the IoT paradigm. We outlined a few key requirements for the deployment
of edge computing in IoT and discussed indispensable of edge computing in IoT.
Furthermore several open research challenges to the successful deployment of edge
computing in IoT are identified and discussed.
I conclude that although the deployment of edge computing in IoT provides numerous
benefits, convergence of these two computing paradigm brings about new issues that
should be resolved in the future.
REFERENCES
1secure edge computing in IoT systems: Review and case studies, Mohammed
Alwaily Department of Electrical Engineering university of south Florida.
2The role of edge computing in Internet of things , Najmul Hassan, Saira Gillani, Ejaz
Ahmed IEEE,2018.
3M.Sathyanayanan et al.,”Edge Anaslytics in the internet of Things,” IEEE Pervasive
Computing,vol. 14,no.2,2015.