Группа авторов

Simulation and Analysis of Mathematical Methods in Real-Time Engineering Applications


Скачать книгу

motivation for edge computing is drawn from its speed of communication. Facial recognition is one of the applications from where it can be inferred that edge computing excels in applications that require short response time [1]. As computing is done closer to the source, visual guiding applications like Google maps create better user experiences. The cloud system becomes less loaded due to offloading offered by edge computing, thus becoming energy efficient. Communication between the initial layer, i.e., smart homes and cloud drain the battery, therefore, an alternative as the edge can overcome the problem [12]. Network traffic and data explosion is prosperity that tempts to adopt edge computing. There are yet many edge computing powers that are clearly mentioned in Figure 2.2. To achieve cloud decentralization and low latency in computing. Resource allocation of front-end devices can be overcome by sustainable energy consumption, which drives edge computing motivation. Edge computing also enhances and supports smart computing techniques.

      In order to implement edge computing, it is vital to take challenges into account.

      Privacy and Security - As edge computing works with various nodes, traveling to and from different networks requires special encryption mechanisms for security (Figure 2.2). Resource containment being one of the properties of edge computing, security methods are required [1].

      Optimization metrics - Edge computing is a distributed paradigm. The workload has to be deployed in various data centres effectively depending on bandwidth, latency, energy, and cost to reduce the response delay [12]. Experiencing uncompromising QoS is another challenge of edge computing (Figure 2.2).

Schematic illustration of edge computing motivation, challenges and opportunities.

      Naming - As the edge network work with various networking devices, the naming scheme has to be followed to avoid confusion with identifying and programming the different edge networks. Naming is also significant for providing security and protection, and mobility of the devices [12].

      Data Abstraction - Edge network collects data from various data generators; a lot of unessential data and noise also get collected. The data is sent to the next layer (abstraction layer), where data abstraction takes place. Unwanted data gets filtered at this layer and is then sent to the upper layer for further process. It is important to effectively filter data as an application may not work if data is filtered when it is a mistake for noise [12]. Partitioning a task and applying offloading mechanism is another challenge when considering edge computing (Figure 2.2).

      With many challenges described in Figure 2.2, virtual and physical security also has to be taken into account before considering edge computing.

       iii) Edge opportunities:

      In light of motivation and challenges, edge computing finds itself promising for both consumers and businesses by creating a seamless experience. Many opportunities are listed in Figure 2.2, where standards, benchmarking, and marketplace are edge opportunities. The possibility of creating a lightweight model framework and algorithms in the edge is another opportunity. Micro-operating system with virtualization is another opportunity of edge.

      Field and Industrial IoT - Power, Transportation and manufacturing are the leading contenders of edge. Industrial devices that include HVAC systems, motors, oil turbines, RFID’s in the supply chain, etc., that use the information to analyze for security management, predictive maintenance, performance and usage tracking, demand forecasting, etc., can witness advancement using edge computing [13].

      Retail and Hospitality - Customer care can be refined using edge and by analyzing customer sentiments using kiosks or point of scale terminal in retail and hospitality using edge computing. Customer experience enhances [13].

      Connected Vehicles - Vehicular system used for tracking, navigation, e.g., police vehicles and predicting maintenance and influence of dynamic pricing is a use case of edge computing [13].

      Facial Recognition - Edge computing allows quicker response in a short time by reducing fraud in banking, institutions and various organization [13].

       iv) Research directions:

      With the discussed challenges taken into account, lack of standardization should be considered while developing an edge computing system. Furthermore, the research needs to identify and provide new challenges like context awareness for further defining the critical exploitation, deployment of edge techniques in cloud computing, IoT, and networks.

      Computational offloading is the migration of computational tasks at a different processor or an external device such as cluster, grid, cloud, base stations, or access points. While running on multiple devices, computation offloading helps promote longer battery lifetime. To enhance the insufficient computation, single users benefit [14].

Schematic illustration of offloading in IoT nodes.

      2.2.1 Need of Computational Offloading and Its Benefit

      Computational offloading is a process of offloading or unloading computation tasks at the edge servers rather than the cloud.

       i) Advantages of Computational Offloading:

      Energy consumption - When computation tasks are performed at the edge servers instead of at the cloud, less energy is consumed,