Professional Documents
Culture Documents
on
EDGE COMPUTING
Submitted In Partial fulfillment of the requirements for award of Degree
BACHELOR OF TECHNOLOGY
in
by
GANJI SHREEYA
(207R1A6617)
CERTIFICATE
This is to certify that the Seminar Report entitled with "EDGE COMPUTING" is a record of
bonafide work carried out by the GANJI SHREEYA with bearing hall ticket number 207R1A6617
during the academic year 2023-24 in partial fulfillment of the award of the degree of Bachelor of
Technology in Computer Science and Engineering(AI&ML).
First and foremost, I wish to express our deep and sincere feeling of gratitude towards our great
institution, CMR Technical Campus for providing us with opportunity of fulfillment of our long cherished goal
of becoming BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING
(AI&ML). I am very much thankful to our Director Dr. A. Rajireddy. Head of the Department Dr.S Rao
Chintalapudi having provided me an excellent academic atmosphere in the institution. I also thank our seminar
guide Mr. Sk. Sharif for extending his support in completion of Technical Seminar Report. We would like to
express our sincere gratitude to our Chairman Shri.C. Gopal Reddy for his encouragement throughout the
course of this seminar.
I also thank all the staff members and friends who assisted me.
GANJI SHREEYA
207R1A6617
ABSTRACT
Edge computing is a transformative technology that brings computing power closer to where
data is generated, rather than relying solely on centralized data centers. This approach aims to address
the limitations of traditional cloud computing, offering faster processing, reduced latency, and
improved efficiency. In a world increasingly reliant on interconnected devices, edge computing
empowers these devices to process data locally, near the "edge" of the network, without the need for
constant communication with distant data centers. This means that devices like smartphones, sensors,
and IoT gadgets can execute tasks more swiftly, making real-time applications like augmented reality,
autonomous vehicles, and smart cities a reality. The key idea behind edge computing is to decentralize
data processing. Instead of sending all data to a distant server, computations occur on the device itself
or on nearby edge servers.
This minimizes the time it takes for data to travel, reducing latency and enhancing user
experience. Furthermore, it lessens the burden on the central cloud infrastructure, making it more
scalable and cost-effective. Edge computing has wide-ranging applications, from improving
healthcare by enabling faster diagnosis through wearable devices to optimizing manufacturing
processes with real-time data analysis. It also enhances security and privacy by reducing the exposure
of sensitive information during transit. In summary, edge computing is revolutionizing the digital
landscape by delivering faster, more efficient, and decentralized computing capabilities at the edge
of the network.
CONTENTS
Page No.
CHAPTER 1 INTRODUCTION 1
CHAPTER 9 CONCLUSION 13
CHAPTER 11 BIBLIOGRAPHY 15
LIST OF FIGURES PAGE NO.
1
CHAPTER-2
WHAT IS EDGE COMPUTING?
In traditional cloud computing, data travels long distances to centralized servers for
processing, causing delays and sometimes privacy concerns. Edge computing changes that by bringing
the data processing and storage closer to where it's needed, right at the "edge" of the network. This
means devices like your phone, IoT gadgets, or autonomous vehicles can perform tasks on the spot,
without waiting for faraway servers. The result is faster response times, reduced lag (or latency), and
improved efficiency. Edge computing is transforming industries and applications, from healthcare and
manufacturing to smart cities and entertainment. It empowers us to have real-time data insights and
enables technologies like AI, IoT, and augmented reality to work seamlessly.
2
CHAPTER-3
Decentralization:
Unlike centralized cloud computing, edge computing disperses data processing across a
network of edge devices or servers. This decentralization enables local data processing, reducing the
reliance on a single, distant data center.
Real-Time Processing:
Edge computing allows for real-time data analysis and decision-making. This feature is
essential for applications like autonomous vehicles, industrial automation, and augmented reality, where
split-second responses are crucial.
Scalability:
Edge computing can be scaled horizontally by adding more edge devices or servers to the
network. This scalability is essential for accommodating increasing data volumes and processing
demands.
3
Enhanced Security:
Edge computing can enhance data security and privacy by minimizing the transmission of
sensitive information to remote data centers. Data remains closer to its source, reducing the exposure to
potential threats during transit.
Robustness:
The distribution of processing tasks across multiple edge devices or servers improves system
robustness. Even if one device fails, the network can continue to function, enhancing reliability.
Customization:
Edge computing allows for customization of applications and services to suit local
requirements. This flexibility is beneficial in various industries, where specific operational needs must
be met.
4
CHAPTER-4
• The objectives of edge computing are aimed at transforming the way data is processed and
delivered in the digital age. At its core, edge computing seeks to minimize network latency,
ensuring that data is processed closer to its source, which is critical for real-time and near
real-time applications like IoT and augmented reality.
• It aims to improve bandwidth efficiency by reducing the need for massive data transmission
to centralized data centers, thereby optimizing available network resources. Another
central objective is enhancing privacy and security by keeping sensitive data localized,
limiting exposure to potential security threats.
• It optimizes the utilization of computing resources and enables local data processing,
fostering faster, context-aware decision-making at the edge. Additionally, edge computing
aims to reduce the total cost of ownership by offloading processing and storage from central
data centers, thus yielding cost savings.
5
CHAPTER-6
Edge computing offers a wide range of applications across various industries, enabling real-time
data processing, low-latency responses, and improved efficiency. Here are five specific edge computing
applications in detail:
6
• Autonomous Vehicles:
➢ Application: Autonomous vehicles, including self-driving cars, drones, and industrial
robots, rely on edge computing for real-time processing of sensor data. Edge devices
process information from cameras, lidar, radar, and other sensors, enabling split-second
decisions to ensure safety and navigation.
➢ Benefits: Lower latency and uninterrupted decision-making are crucial for autonomous
systems. Edge computing helps vehicles detect obstacles, make rapid navigation
choices, and prevent accidents. It also supports vehicle-to-vehicle (V2V)
communication for enhanced safety and traffic management.
7
• Manufacturing and Industrial Automation:
o Application: In manufacturing and industrial settings, edge computing optimizes
automation and process control. Industrial IoT (IIoT) devices on the factory floor
collect data on machine performance, quality control, and safety. Edge computing
processes this data to improve production efficiency and minimize downtime.
8
CHAPTER-6
Edge computing architecture is a framework that outlines how data processing and computing
resources are structured at the edge of the network, nearer to the data source. It encompasses edge
devices (like sensors and smartphones), edge servers, local data storage, various connectivity
options, and edge applications. Edge devices generate data, and edge Servers process and analyze
it locally, reducing latency. Local data storage and connectivity solutions enable communication,
while edge applications facilitate real-time data processing. Security measures are essential to
safeguard this decentralized system, enhancing efficiency for applications like IoT and AI.
9
CHAPTER-7
RISKS OF EDGE COMPUTING
Edge computing, while transformative, is not without its risks. One primary concern is
security. Decentralizing data processing means there are more points of potential vulnerability.
Edge devices can be physically accessed or compromised, leading to data breaches or unauthorized
access.
• Scalability can also be a concern. Adding more edge devices to accommodate growing data
demands may not always be straightforward, and the network's architecture could become
unwieldy.
• Furthermore, relying on local resources can be limiting. Edge devices often have limited
computational power and storage, which might constrain the scale and complexity of
applications.
• Lastly, the potential for data loss exists. Local storage on edge devices can be vulnerable
to physical damage or loss, leading to irreplaceable data.
• To mitigate these risks, robust security measures, efficient device management, and
thoughtful scalability planning are crucial when implementing edge computing solutions.
10
CHAPTER-8
ADVANTAGES AND DISADVANTAGES
• Low Latency: Edge computing significantly reduces data transmission times, enabling real-
time processing and decision-making. This is critical for applications like autonomous vehicles
and augmented reality, where split-second responses are vital.
• Enhanced Privacy and Security: By processing data locally, sensitive information stays
closer to its source, reducing the risk of data breaches and ensuring better data privacy
compliance.
• Improved Reliability: Edge computing decentralizes processing, making systems more
resilient to failures in the central cloud. Devices can function autonomously even when network
connectivity is disrupted.
• Bandwidth Efficiency: It optimizes network bandwidth by reducing the amount of data that
needs to be sent to central servers, making it more cost-effective for data-intensive applications.
• Scalability: Edge computing is highly scalable, making it suitable for applications ranging
from a single device to large-scale IoT deployments.
• Optimized Resource Utilization: Local data processing reduces the load on central cloud
servers, leading to more efficient use of cloud resources and lowering operational costs.
• Versatility: Edge computing is applicable across various domains, from healthcare to
manufacturing, making it a versatile solution for diverse industries.
11
Disadvantages of Edge Computing
12
CHAPTER-9
CONCLUSION
In conclusion, edge computing represents a groundbreaking shift in the way we process and
utilize data. By bringing computational power closer to the source of data generation, it offers tangible
benefits in terms of reduced latency, faster response times, and improved efficiency. This transformative
technology has a profound impact on various industries and applications, from IoT and AI to
autonomous systems and healthcare.
However, it's important to acknowledge the challenges that come with edge computing, such as
limited scalability, resource constraints, security concerns, management complexities, and
interoperability issues. These disadvantages must be carefully addressed to maximize the potential of
edge computing. Despite these challenges, the promise of edge computing is undeniable. It empowers
devices to make real-time decisions, enhances the capabilities of AI and IoT, and paves the way for
smarter cities and more efficient industries. As technology continues to evolve, edge computing is
poised to play a pivotal role in shaping a future where data is processed swiftly and efficiently, leading
to a world that is more connected, responsive, and data-driven. It is a technology that holds great
potential and is set to redefine how we interact with and benefit from the vast amounts of data generated
in our increasingly digital world.
13
CHAPTER-10
FUTURE SCOPE
• The future scope of edge computing is exceedingly promising as it is poised to play a pivotal
role in the ongoing digital transformation. With the proliferation of IoT, 5G networks, and the
demand for real-time data processing, edge computing is set to become a critical infrastructure
for a multitude of industries
.
• It will empower applications like autonomous vehicles, smart cities, and remote healthcare by
reducing latency and enabling faster, context-aware decision-making at the edge. The
deployment of edge computing will also enhance data security and privacy, allowing
organizations to comply with evolving data protection regulations.
• Moreover, edge computing will lead to more energy-efficient data processing, reduce the load
on centralized data centers, and lower operational costs. This technology's versatility and ability
to cater to specific use cases and industries will further drive its adoption.
• Furthermore, the healthcare sector will leverage edge computing for remote patient monitoring,
telemedicine, and the development of advanced healthcare devices.
• In essence, the future of edge computing is marked by its versatility and adaptability, enabling
it to revolutionize a multitude of industries and applications, driving innovation, efficiency, and
the next wave of technological advancements. As technology continues to advance, edge
computing will stand as a critical pillar of this digital transformation, reshaping the way we
process and utilize data.
14
CHAPTER-11
BIBLIOGRAPHY
[1] N. Hassan, S. Gillani, E. Ahmed, I. Yaqoob, M. Imran, The role of edge computing in internet
of things, IEEE Communications Magazine (99) (2018) 1–6.
[2] M. Liu, F. R. Yu, Y. Teng, V. C. Leung, M. Song, Distributed resource allocation in
blockchain-based video streaming systems with mobile edge computing, IEEE Transactions
on Wireless Communications 18 (1) (2019) 695–708.
[3] E. Ahmed, A. Akhunzada, M. Whaiduzzaman, A. Gani, S. H. Ab Hamid, R. Buyya, Network-
centric performance analysis of runtime application migration in mobile cloud computing,
Simulation Modelling Practice and Theory 50 (2015) 42–56.
[4] P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino, A. Liotta, An edge-based architecture
to support efficient applications for healthcare industry 4.0, IEEE Transactions on Industrial
Informatics 15 (1) (2019) 481–489.
[5] U. Shaukat, E. Ahmed, Z. Anwar, F. Xia, Cloudlet deployment in local wireless networks: Mo-
tivation, architectures, applications, and open challenges, Journal of Network and Computer
Applications 62 (2016) 18–40.
[6] I. Yaqoob, E. Ahmed, A. Gani, S. Mokhtar, M. Imran, S. Guizani, Mobile ad hoc cloud: A
survey, Wireless Communications and Mobile Computing 16 (16) (2016) 2572–2589.
[7] W. Bao, D. Yuan, Z. Yang, S. Wang, W. Li, B. B. Zhou, A. Y. Zomaya, Follow me fog: Toward
seamless handover timing schemes in a fog computing environment, IEEE Communications
Magazine 55 (11) (2017) 72–78. doi:10.1109/MCOM.2017.1700363.
[8] E. Ahmed, M. H. Rehmani, Mobile edge computing: opportunities, solutions, and challenges,
Future Generation Computer Systems 70 (2017) 59–63.
[9] Y. Jararweh, A. Doulat, O. AlQudah, E. Ahmed, M. Al-Ayyoub, E. Benkhelifa, The future
of mobile cloud computing: integrating cloudlets and mobile edge computing, in: Telecom-
munications (ICT), 2016 23rd International Conference on, IEEE, 2016, pp. 1–5.
15