EdgeComputing
EdgeComputing
Course Description
Introduction, What Is Edge Computing, Why Do We Need Edge Computing, Key Techniques that Enable
Edge Computing, Definition, Benefits, Edge Computing Systems, Multi Access Edge Computing, To Edge or
Not to Edge, The Cloud Part of MEC, The Edge Part of MEC, The Access Part of MEC, Challenges and
Opportunities in Edge Computing, Service Management, Privacy and Security, Application Distribution,
Edge Computing Tools, Virtualization, Resource Management, Edge Analytics, Conceptual Framework for
Security and Privacy in Edge Computing, Overview of Security, Privacy, and Threats in Edge Computing,
Framework for Security and Privacy in Edge Computing, case study and use cases
Course Objectives
CO1 Introducing the Edge computing and need for edge computing
CO2 Developing understanding about the architecture, design of edge computing and its benefits over
cloud computing
CO3 Exploring the Multi-access edge computing and its challenges and benefits
CO4 Developing understanding about Security, Privacy and threats in Edge computing
Text Book(s)
T1 Edge Computing: A Primer, Jie Cao • Quan Zhang • Weisong Shi, Springer
T2 Multi-Access Edge Computing in Action, Dario Sabella, Alex Reznik, Rui Frazao, CRC press
T3
Learning Outcomes:
Students will :
LO2 Appreciate the necessity and usage of edge computing in different domains
LO4 Recognize the role of edge computing involving multiple access points
Academic Term
Course Title
Course No
Lead Instructor
Glossary of Terms
Contact Hour CH Contact Hour (CH) stands for an hour long live session with students
conducted either in a physical classroom or enabled through technology.
In this model of instruction, instructor led sessions will be for 32 CH.
Module Summary
No. Content of the Module
M1 1 Introduction
1.1 What Is Edge Computing
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge Computing
1.1.3 Edge Computing Definition
1.1.4 Edge Computing Benefits
1.1.5 Edge Computing Systems
M2 2 Multi Access Edge Computing
2.1 To Edge or Not to Edge
2.2 The Cloud Part of MEC
2.3 The Edge Part of MEC
2.4 The Access Part of MEC
2.4.1 Real-Time Data Processing
2.4.2 SLAs and Regulatory Requirements
M3 3 Challenges and Opportunities in Edge Computing
3.1 Programmability
3.2 Naming
3.3 Data Abstraction
3.4 Service Management
3.5 Privacy and Security
3.6 Application Distribution
3.7 Scheduling Strategies
3.8 Business Model
M4 4 Existing Edge Computing Tools
4.1 What Is Your Role in Edge Computing?
4.2 Virtualization
4.2.1 Virtual Machine and Container
4.2.2 Network Virtualization
4.3 Resource Management
4.3.1 Kubernetes and Docker
4.4 Developing Platforms for Edge Computing
4.4.1 Edge Analytics
4.4.2 Development Tools and Platforms
M5 5 A Conceptual Framework for Security and Privacy in Edge Computing
5.1 Introduction
5.2 Similarities and Differences Between Edge Paradigms
5.3 Overview of Security, Privacy, and Threats in Edge Computing
5.4 Framework for Security and Privacy in Edge Computing
M6 6 EdgeOS: A Home Operating System for Internet of Everything
6.1 Introduction
6.2 Related Work
6.3 EdgeOS: Overview and Design
6.3.1 Overview
6.3.2 Design
M7 7 MEC Use Cases and Service Scenarios
7.1 Intelligent Video Acceleration
7.2 Video Stream Analysis
7.3 Augmented Reality
7.4 Assistance for Intensive Computation
7.5 MEC in the Enterprise Setting
7.6 Connected Vehicles
7.7 IoT Gateway
7.7.1 Public Edge Clouds
Detailed Structure
Contact List of Topic Title Topic # Text/Ref Book/external
Hour (from content structure in Part A) (from content resource
structure in Part
A)
1 1 Introduction T1, CH 1
1.1 What Is Edge Computing
2
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge
Computing
31 Labs
32
2 Dockers – Creating
containers
Building Containers
using Dockerfile
2 Simulation –
PureEdgeSim
4 Simulation –
EdgeCloudSim
5 Kubernetes
7
Evaluation Scheme:
It shall be the responsibility of the individual student to be regular in maintaining the self-study schedule as
given in the course handout, attend the online lectures, and take all the prescribed evaluation components such
as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.