What is Edge Computing? Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible. The move toward edge computing is driven by mobile computing, the decreasing cost of computer components and the sheer number of networked devices in the internet of things(IoT). Depending on the implementation, time-sensitive data in an edge computing architecture may be processed at the point of origin by an intelligent device or sent to an intermediary server located in close geographical proximity to the client. Data that is less time sensitive is sent to the cloud for historical analysis, big data analytics and long-term storage. Difference between Cloud computing and Edge Computing
Parameters | Cloud Computing | Edge Computing |
Service Location | Within the Internet | In the edge network |
Distance (number of hops) | Multiple hops | Single hops |
Latency | high | Low |
Target User | General Internet users | Mobile Users |
Jitter | High | Very low |
Location awareness | No | yes |
GeoDistribution | Centralized | Distributed |
Mobility Support | Limited | Supported |
Data in route attack | High probability | Very low probability |
Service scope | Global | Limited |
Uses of Edge Computing Edge Computing can be used to help resolve a variety of situations. When IoT devices have a poor connectivity, or when the connection is intermittent, Edge Computing provides a convenient solution because it doesn’t need a connection to process the data or make a decision. It also has the effect of reducing time loss, because the data does not have to travel across a network to reach a data center or Cloud. In situations where a loss of milliseconds is unacceptable, such as in manufacturing or financial services, Edge Computing can be quite useful in.
Edge Computing Security There are two arguments regarding the security of Edge Computing. Some suggest security is better with Edge Computing because the data stays closer to its source and does not move through a network. They argue the less data stored in a corporate data center, or Cloud, the less data that is vulnerable to hackers. Others suggest Edge Computing is significantly less secure because “edge devices” can be extremely vulnerable, and the more entrances to a system, the more points of attack available to a hacker. This makes security an important aspect in the design of any “edge” deployment. Access control, data encryption, and the use of virtual private network tunneling are important parts of defending an Edge Computing system. Need of Edge Computing Edge Computing helps enterprises address cost, bandwidth and latency issues across a broad range of IoT applications. Here are three key reasons why you need Edge Computing:
Challenges inEdge Computing
References