0% found this document useful (0 votes)
905 views15 pages

Edge Computing

This document provides an overview of edge computing presented by syndicate members at the FEL, CE Department. It begins with an introduction to edge computing, discusses its history and working principles. It then outlines key applications such as IoT, AR/VR, CDN, AI and 5G. The presentation covers future development areas and challenges, advantages like speed and reliability, as well as disadvantages including costs and security issues. It concludes by emphasizing the importance of data protection measures for edge computing systems.

Uploaded by

Praveen Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
905 views15 pages

Edge Computing

This document provides an overview of edge computing presented by syndicate members at the FEL, CE Department. It begins with an introduction to edge computing, discusses its history and working principles. It then outlines key applications such as IoT, AR/VR, CDN, AI and 5G. The presentation covers future development areas and challenges, advantages like speed and reliability, as well as disadvantages including costs and security issues. It concludes by emphasizing the importance of data protection measures for edge computing systems.

Uploaded by

Praveen Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

FEL,CE DEPARTMENT

DEE COMN 42-A

TECHNICAL PRESENTATION ON
EDGE COMPUTING

SYNDICATE - 07

SYNDICATE MEMBERS DIRECTING STAFF


HAV I DANDASI SE(Dr) MAHESH BABU
HAV G MUKUNDA RAO ASST DIRECTING STAFF
HAV DHARMENDRA KUMAR SUB SHAJI C
HMT K SUNIL
AIM

To study about Edge Computing and their applications


PREVIEW
 Introduction

 History

 Working Principle

 Applications

 Future Development

 Advantages & Disadvantages

 Conclusion
INTRODUCTION
 Enhanced Data Rates for GSM Architecture

 Any Computing and Network Resources along the path between data
sources centres.

 The real time data processing at source/on premises data visualization


basic analitics data catching, buffering data filtering,optimization M2M
communication
ARCHITECTURE OF EDGE COMPUTING AND IOT
CONNECTIVITY OF CLOUD,EDGE AND IOT
HISTORY
 Late 1990s, Akami introduced CDN

 Pervasive computing:-in 1997, Brain noble and is colleagues implemented


speech recognition on mobile

 Peer-To-Peer:- the turn cyber-foraging was introduced by Mahadev


Satyanarayana in 2001.

 Cloud computing:- in 2006,this opened up a raft of new apportunities in terms


of computation,visualization,and storage capacity.

 Cloudlest:- in 2009 ,the two-level architecure was introduced.

 Fog computing:- in 2012,the term fog computing was introduced.

 Edge computing:- Today,


WORKING PRINCIPLE
 Healthcare during the COVID-19

 Transportation

 Retail sector

 Industry Assembly line

 Automobile Industry

 Agriculture Sector

 Fleet Management

 Smart Cities

 Financial Sector

 Software-Defined Networking and 5G


APPLICATIONS
 IOT Device

 AR\VR

 CDN

 Artificial Intelligence

 5G
FUTURE DOVELOPMENT
 Hackers can access the data and information stored in the devices at their own pace

 Software updates and security configuration are not present in the devices in edge network

 There is need to balance more bandwidth across an edge network

 Many remote locations lack skilled employees to manage and deploy the edge networkon a
regular basis

 Businesses are chalanged to have optimally categorized data in a distributed computing


environment

 The maintenance of the data privacy and security is a crucial challange for usesrs and
businesses

 To track and manage the devices


KEY BENFITS
 Scalability

 Reliability

 Speed

 Latency

 Security

 Cost
ADVANTAGES
 Speed is increased.

 Reliability is increased.

 The random issue is reduced.

 The compliance issue is reduced.

 Hacking issues are reduced.

 Edge computing is used for real time processing.

 Storing of data can be done rapidly in edge computing.

 Reduce the distance in data processing.


DIS ADVANTAGES
 It is operations can not be extended to IT/OT team
 It can not perform resourse pooling
 It is interconnected through proprietary network with custom security and
little interoperability.
 It is limited to smaller number of pheripheral layers.
 Reduced privacy and security.
 Increased hardware cost.
 The cost of edge computing is very high.
 It only analasys the data.
 It requires more storage capacity.
CONCLUSION
 Data encryption, access control, and the use of virtual private networks
are crucial elements to protect the edge computing system.
JAIHIND

You might also like