0% found this document useful (0 votes)
39 views

EdgeComputing

Uploaded by

raghunathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

EdgeComputing

Uploaded by

raghunathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI

WORK INTEGRATED LEARNING PROGRAMMES


Digital Learning

Part A: Course Design

Course Title Edge Computing


Course No(s) SS ZG 5XX
Credit Units 5
Content Authors Chandra Shekar RK
Version 1.0

Course Description

Introduction, What Is Edge Computing, Why Do We Need Edge Computing, Key Techniques that Enable
Edge Computing, Definition, Benefits, Edge Computing Systems, Multi Access Edge Computing, To Edge or
Not to Edge, The Cloud Part of MEC, The Edge Part of MEC, The Access Part of MEC, Challenges and
Opportunities in Edge Computing, Service Management, Privacy and Security, Application Distribution,
Edge Computing Tools, Virtualization, Resource Management, Edge Analytics, Conceptual Framework for
Security and Privacy in Edge Computing, Overview of Security, Privacy, and Threats in Edge Computing,
Framework for Security and Privacy in Edge Computing, case study and use cases

Course Objectives

The course aims at:

CO1 Introducing the Edge computing and need for edge computing

CO2 Developing understanding about the architecture, design of edge computing and its benefits over
cloud computing

CO3 Exploring the Multi-access edge computing and its challenges and benefits

CO4 Developing understanding about Security, Privacy and threats in Edge computing

Text Book(s)

T1 Edge Computing: A Primer, Jie Cao • Quan Zhang • Weisong Shi, Springer
T2 Multi-Access Edge Computing in Action, Dario Sabella, Alex Reznik, Rui Frazao, CRC press
T3

Reference Book(s) & other resources

R1 Edge Computing from Hype to reality, Fadi Al Turjman,


R2
R3

Learning Outcomes:

Students will :

LO1 Get an overview of Edge computing, its architectures and advantages

LO2 Appreciate the necessity and usage of edge computing in different domains

LO3 Appreciate the need for security in Edge computing

LO4 Recognize the role of edge computing involving multiple access points

Part B: Course Handout

Academic Term
Course Title
Course No
Lead Instructor

Glossary of Terms

Module M Module is a standalone quantum of designed content. A typical course is


delivered using a string of modules. M2 means module 2.

Contact Hour CH Contact Hour (CH) stands for an hour long live session with students
conducted either in a physical classroom or enabled through technology.
In this model of instruction, instructor led sessions will be for 32 CH.

Recorded RL RL stands for Recorded Lecture or Recorded Lesson. It is presented to the


Lecture student through an online portal. A given RL unfolds as a sequences of
video segments interleaved with exercises.

Lab Exercises LE Lab exercises associated with various modules

Self-Study SS Specific content assigned for self-study

Homework HW Specific problems/design/lab exercises assigned as homework


Modular Structure

Module Summary
No. Content of the Module
M1 1 Introduction
1.1 What Is Edge Computing
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge Computing
1.1.3 Edge Computing Definition
1.1.4 Edge Computing Benefits
1.1.5 Edge Computing Systems
M2 2 Multi Access Edge Computing
2.1 To Edge or Not to Edge
2.2 The Cloud Part of MEC
2.3 The Edge Part of MEC
2.4 The Access Part of MEC
2.4.1 Real-Time Data Processing
2.4.2 SLAs and Regulatory Requirements
M3 3 Challenges and Opportunities in Edge Computing
3.1 Programmability
3.2 Naming
3.3 Data Abstraction
3.4 Service Management
3.5 Privacy and Security
3.6 Application Distribution
3.7 Scheduling Strategies
3.8 Business Model
M4 4 Existing Edge Computing Tools
4.1 What Is Your Role in Edge Computing?
4.2 Virtualization
4.2.1 Virtual Machine and Container
4.2.2 Network Virtualization
4.3 Resource Management
4.3.1 Kubernetes and Docker
4.4 Developing Platforms for Edge Computing
4.4.1 Edge Analytics
4.4.2 Development Tools and Platforms
M5 5 A Conceptual Framework for Security and Privacy in Edge Computing
5.1 Introduction
5.2 Similarities and Differences Between Edge Paradigms
5.3 Overview of Security, Privacy, and Threats in Edge Computing
5.4 Framework for Security and Privacy in Edge Computing
M6 6 EdgeOS: A Home Operating System for Internet of Everything
6.1 Introduction
6.2 Related Work
6.3 EdgeOS: Overview and Design
6.3.1 Overview
6.3.2 Design
M7 7 MEC Use Cases and Service Scenarios
7.1 Intelligent Video Acceleration
7.2 Video Stream Analysis
7.3 Augmented Reality
7.4 Assistance for Intensive Computation
7.5 MEC in the Enterprise Setting
7.6 Connected Vehicles
7.7 IoT Gateway
7.7.1 Public Edge Clouds

Detailed Structure
Contact List of Topic Title Topic # Text/Ref Book/external
Hour (from content structure in Part A) (from content resource
structure in Part
A)

1 1 Introduction T1, CH 1
1.1 What Is Edge Computing
2
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge
Computing

3 1.1.3 Edge Computing Definition T1, CH 1


1.1.4 Edge Computing Benefits
4
1.1.5 Edge Computing Systems

5 2 Multi Access Edge Computing T2, CH 1


2.1 To Edge or Not to Edge
6
2.2 The Cloud Part of MEC
2.3 The Edge Part of MEC

7 2.4 The Access Part of MEC T2, CH 1


2.4.1 Real-Time Data Processing
8
2.4.2 SLAs and Regulatory Requirements

9 3 Challenges and Opportunities in Edge T1, CH 5


Computing
10
3.1 Programmability
3.2 Naming
3.3 Data Abstraction
3.4 Service Management

11 3.5 Privacy and Security T1, CH 5


3.6 Application Distribution
12 3.7 Scheduling Strategies
3.8 Business Model

13 4 Existing Edge Computing Tools T1, CH 6


4.1 What Is Your Role in Edge Computing?
14
4.2 Virtualization
4.2.1 Virtual Machine and Container

15 4.2.2 Network Virtualization T1, CH 6


4.3 Resource Management
16
4.3.1 Kubernetes and Docker

17 4.4 Developing Platforms for Edge T1, CH 6


Computing
18
4.4.1 Edge Analytics
4.4.2 Development Tools and Platforms

19 5 A Conceptual Framework for Security R1, CH 10


and Privacy in Edge Computing
20
5.1 Introduction
5.2 Similarities and Differences Between
Edge Paradigms

21 5.3 Overview of Security, Privacy, and R1, CH 10


Threats in Edge Computing
22
5.4 Framework for Security and Privacy in
Edge Computing

23 6 EdgeOS: A Home Operating System for T1, CH 2


Internet of Everything
24
6.1 Introduction
6.2 Related Work

25 6.3 EdgeOS: Overview and Design T1, CH 2


6.3.1 Overview
26
6.3.2 Design

27 7 MEC Use Cases and Service Scenarios T2, CH 2


7.1 Intelligent Video Acceleration
28
7.2 Video Stream Analysis
7.3 Augmented Reality
29 7.4 Assistance for Intensive Computation T2, CH 2
7.5 MEC in the Enterprise Setting
30
7.6 Connected Vehicles
7.7 IoT Gateway
7.7.1 Public Edge Clouds

31 Labs

32

Experiential Leaning Component

Lab Topic Description

1 EC2 – Creating Virtual 


machines, Scaling,
Availability

2 Dockers – Creating 
containers
Building Containers
using Dockerfile

2 Simulation – 
PureEdgeSim

4 Simulation – 
EdgeCloudSim

5 Kubernetes 

6 AWS – IoT, GreenGrass 

7 

Evaluation Scheme:

Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session

No Name Type Duration Weight Day, Date, Session, Time


Experiential learning Take 15 days 15% TBA
EC-1 Assignment-I Home
Experiential learning Take 15 days 15% TBA
Assignment-II Home
EC-2 Mid-Semester Test Closed 2 hours 30% Per programme schedule
Book
EC-3 Comprehensive Open 3 hours 40% Per programme schedule
Exam Book

Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos. 1 to 8


Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 16)

Important links and information:


Elearn portal: https://elearn.bits-pilani.ac.in
Students are expected to visit the Elearn portal on a regular basis and stay up to date with the latest
announcements and deadlines.
Contact sessions: Students should attend the online lectures as per the schedule provided on the Elearn portal.
Evaluation Guidelines:
1. EC1 consists of two assignments. Announcements will be made available on the portal, in a timely
manner.
2. For Closed Book tests: No books or reference material of any kind will be permitted.
3. For Open Book exams: Use of books and any printed / written reference material (filed or bound) is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all
exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
4. If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student
should follow the procedure to apply for the Make-Up Test/Exam which will be made available on the
Elearn portal. The Make-Up Test/Exam will be conducted only at selected exam centres on the dates to
be announced later.

It shall be the responsibility of the individual student to be regular in maintaining the self-study schedule as
given in the course handout, attend the online lectures, and take all the prescribed evaluation components such
as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.

You might also like