Edge computing is a method of optimising cloud computing systems by performing data processing at the edge of the network, near the source of the data. This reduces the communications bandwidth needed between sensors and the central datacentre by performing analytics and knowledge generation at or near the source of the data. This approach requires leveraging resources that may not be continuously connected to a network such as laptops, smartphones, tablets and sensors. Edge computing covers a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, cooperative distributed peer-to-peer ad hoc networking and processing also classifiable as local cloud/fog computing and grid/mesh computing, dew computing, mobile edge computing, cloudlet, distributed data storage and retrieval, autonomic self-healing networks, remote cloud services, augmented reality, and more.
Video Edge computing
Overview
Edge computing pushes applications, data and computing power (services) away from centralized points to the logical extremes of a network. Edge computing replicates fragments of information across distributed networks of web servers, which may spread over a vast area. As a technological paradigm, edge computing is also referred to as mesh computing, peer-to-peer computing, autonomic (self-healing) computing, grid computing, and by other names implying non-centralized, nodeless availability.
To ensure acceptable performance of widely dispersed distributed services, large organizations typically implement edge computing by deploying Web server farms with clustering. Previously available only to very large corporate and government organizations, edge computing has utilized technology advances and cost reductions for large-scale implementations have made the technology available to small and medium-sized businesses.
The target end-user is any Internet client making use of commercial Internet application services.
Edge computing imposes certain limitations on the choices of technology platforms, applications or services, all of which need to be specifically developed or configured for edge computing.
Possible advantages of edge computing are:
- Edge application services significantly decrease the volumes of data that must be moved, the consequent traffic, and the distance the data must travel, thereby reducing transmission costs, shrinking latency, and improving quality of service (QoS).
- Edge computing eliminates, or at least de-emphasizes, the core computing environment, limiting or removing a major bottleneck and a potential point of failure.
- Security improves as encrypted data moves further in, toward the network core. As it approaches the enterprise, data is checked as it passes through protected firewalls and other security points, where viruses, compromised data, and active hackers can be caught early on.
- The ability to "virtualize" (i.e., logically group CPU capabilities on an as-needed, real-time basis) extends scalability. The edge-computing market generally operates basically on a "charge for network services" model, and it could be argued that typical customers for edge services are organizations desiring linear scale of business application performance to the growth of, e.g., a subscriber base.
ISO/IEC 20248 provides a method whereby the data of objects identified by edge computing using Automated Identification Data Carriers [AIDC], a barcode and/or RFID tag, can be read, interpreted, verified and made available into the "Fog" and on the "Edge" even when the AIDC tag has moved on.
Grid computing
Edge computing and grid computing are related. Whereas grid computing would be hard-coded into a specific application to distribute its complex and resource intensive computational needs across a global grid of cheap networked machines, edge computing provides a generic template facility for any type of application to spread its execution across a dedicated grid of prepared expensive machines.
Maps Edge computing
See also
- Fat client
- Cloudlet
- Mobile edge computing
- Utility computing
References
Source of the article : Wikipedia