You are on page 1of 26

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

JNANASANGAMA, BELAGAVI-590018

A seminar report On
“EDGE COMPUTING IN IOT”
Submitted in partial fulfillment of the requirements for the award of degree of

Bachelor of Engineering
in
Computer Science and Engineering

Submitted by
K SHIVARUDRA GOUDA
4KM20CS017

Under the guidance of


Prof. Ms Bhagyashree M ,MSc
Professor

DEAPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

2023-24

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


KARAVALI INSTITUTE OF TECNOLOGY
NEERUMARGA, MANGALORE - 575029
KARAVALI INSTITUTE OF TECHNOLOGY
NEERUMARGA, MANGALORE-575029

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

2023-24

It is certified that the seminar report entitled “EDGE COMPUTING IN IOT” is


carried out by K SHIVARUDRA GOUDA(4KM20CS017) is a bonafide student of
Karavali Institute of Technology, Neerumarga, Mangalore, has submitted this report in
partial fulfillment for the award of degree of Bachelorof Engineering in Computer Science
and Engineering of the Visvesvaraya Technological University, Belagavi during the
academic year 2023-24.

Guide Head of the department


Ms. Bhagyashree M Dr. B JANA
Professor Professor

Principal
Dr. P.Rajendra Prasad , M. Tech, Ph.D,
MISTE,ORSI
KIT, Mangalore

Name of Examiners Signature with Date

1. 1.

2. 2.
DECLARATION

I Shivarudra gouda hereby declare that the report presented in this seminar entitled
“EDGE COMPUTING IN IOT” is an authentic collection of information that has
been carried out independently in my 8th semester Computer Science and Engineering at
Karavali Institute of Technology under the guidance of Ms. Bhagyashree M.

Date: K SHIVARUDRA GOUDA


Place:Mangalore (4KM20CS017)

i
ACKNOWLEDGMENT

I, K Shivarudra gouda bearing USN 4KM20CS017, wish to express my sincere


gratitude to my guide Ms.Bhagyashree M , Professor, Computer Science and
Engineering for his continuous support and guidance, hence improving my knowledge.

I would like to convey my heartful thanks to Ms. Bhagyashree M, Computer Science


and Engineering for giving me the opportunity to embark upon this topic and for their
continuous encouragement throughout the preparation.

I would like to convey my heart full thanks to Dr. B JANA, Head of the Department,
Computer Science and Engineering for giving me the opportunity to embark upon this
topic and for their continuous encouragement throughout the preparation.

I am also thankful to the respected Dr. Rajendra Prasad, Principal and faculty
members of Karavali Institute of Technology, Mangalore for providing all the facilities
that helped me in timely completion of this seminar report.

We would like to express my sincere gratitude to the authorities of Karavali Institute of


Technology, especially we would like to express my deep sense of gratitude to our
honorable Chairman Sri S Ganesh Rao sir, for his continues effort in creating a
competitive environment in our college and encouraging throughout this course.

Sincerely,
K SHIVARUDRA GOUDA
(4KM20CS017)

ii
CONTENTS

Description Page no.

DECLARATION i
ACKNOWLEDGMENT ii

CONTENTS iii

LIST OF FIGURES iv

INTRODUCTION 1-2
CHAPTER 1
CHAPTER 2 TERMS AND DEFINITION 3-4

CHAPTER 3 OVERVIEW 5-6

CHAPTER 4 WORKING 7

CHAPTER 5 ARCHITECTURE 8-10

5.1 Privacy and Security 11

5.2 Measures and risk reduction 11-12

CHAPTER 6 CASE STUDY 13-15

6.1 Autonomous Vehicle 15-17

6.2 5G Network 17-18

CHAPTER 7 CONCLUSION 19

REFERENSES 20

iii
LIST OF FIGURES

Fig No. Description Page No.

1 Overview of Edge computing 5

2 Working of Edge computing 7

3 Architecture of Edge computing 8

4 Sources of Architecture layer 10

5 Smart parking system 13

6 Architecture of Smart parking system 14

iv
EDGE COMPUTING IN IOT 2022-23
CHAPTER-1

INTRODUCTION
Internet of Things (IOT) was first introduced to the community in 1999 for supply
chain management, and then the concept of “making a computer sense information
without the aid of human intervention” was widely adapted to other fields such as
healthcare, home, environment, and transports. Now with IOT, we will arrive in the
post-cloud era, where there will be a large quality of data generated by things that are
immersed in our daily life, and a lot of applications will also be deployed at the edge to
consume these data.

Some IOT applications might require very short response time, some might involve
private data, and some might produce a large quantity of data which could be a heavy
load for networks. Cloud computing is not efficient enough to support these applications.
With the push from cloud services and pull from IOT, we envision that the edge of the
network is changing from data consumer to data producer as well as a data consumer.

Millions of devices interconnected with each other gather/exchange data among


themselves via network infrastructures linked by a countless number of distributed
nodes.At that point, a range of IoT apps can efficiently deliver a lot more reliable and
precise network services for individuals.

In cloud computing, all data should be sent to a central server where the majority of
computing is carried out. Then, the results of that computation need to be returned to
these gadgets and sensors.The direction of future computing will go beyond
conventional computing. IoT systems are integrated into day-to-day lives quickly.
Physical devices and endpoints include wearable fitness bands, smart vehicles, sensor
units, and actuators, which represents a massive future jump in the scope of data
manufacturing.

Edge Computing aims to process the data very close to the source where it is produced.
Many electronic devices are currently connected to the Internet of Things which will
produce a massive volume of data, and it might be even larger with mobile phones in a
5G network. Cisco Global Cloud Index estimated in 2019 that IOT devices will

Department of Computer Scince and Engineering,KIT 1


EDGE COMPUTING IN IOT 2022-23
generate around 500 zettabytes of data . Furthermore, data traffic will be approximately
10.4 zettabytes, which is up from 3.4 zettabytes in 2014 . Moreover, by 2020, 50 million
streaming IOT devices will be in use .

Edge Computing refers to processing the data on the device and very close to the device.
This massive volume of data might be hard to handle entirely on the Cloud Computing
network. To face this challenge, Edge Computing offers the full computation or part of
the computation that can process the data at the Edge network, which is in very close
proximity to the data source. It enables low latency, faster response, and more
comprehensive data analysis.

Usually, devices connected to the IOT provide the service in healthcare, smart cities,
smart grid, transportation, multimedia, and security. In general, those services depend
on AI methodologies, which are compute intensive and use massive data. A few years
back, these devices usually sent the data to the cloud or local data centre to process the
data. With ongoing development in Edge Computing, the part of the data at the Edge
node can be processed, thus minimizing the application’s overall latency.

Department of Computer Scince and Engineering,KIT 2


EDGE COMPUTING IN IOT 2022-23
CHAPTER-2

EDGE COMPUTING TERMS AND DEFINITION

Edge: What the edge is depends on the use case. In a telecommunications field, perhaps
the edge is a cell phone or maybe it’s a cell tower. In an automotive scenario, the edge
of the network could be a car. In manufacturing, it could be a machine on a shop floor;
in enterprise IT, the edge could be a laptop.

Edge server: Edge servers can be defined as “a computer for running middleware or
applications that sits close to the edge of the network, where the digital world meets the
real world. Edge servers are put in warehouses, distribution centers and factories, as
opposed to corporate headquarter”.

Edge devices: These can be any device that produces data. These could be sensors,
industrial machine or other devices that produce or collect data.

Examples of edge devices: An edge device can be defined in several ways.


You could think of it as an entry point into enterprise or service provider core networks.
Examples include routers, switches, integrated access devices (IADs), multiplexers, and
a variety of metropolitan area network (MAN) and wide area network (WAN) access
devices. These devices also provide connections into carrier and service provider
networks. Edge computing uses a range of existing and new equipment. Many devices,
sensors and machines can be outfitted to work in an edge computing environment by
simply making them Internet-accessible. Cisco and other hardware vendors have a line
of ruggedized network equipment that has hardened exteriors meant to be used in field
environments. A range of computer servers, converged systems and even storage-based
hardware systems like Amazon Web Service’s Snowball can be used in edge computing
deplo

Mobile edge computing: This refers to the buildout of edge computing systems in
telecommunications systems, particularly 5G scenarios. Mobile edge computing is a
network architecture concept that enables cloud computing capabilities and an IT
service environment at the edge of the cellular network. The basic idea behind MEC

Department of Computer Scince and Engineering,KIT 3


EDGE COMPUTING IN IOT 2022-23
that by running applications and performing related processing tasks closer to the
cellular customer, network congestion is reduced and applications perform better.

GE Digital, Qualcomm Technologies and Nokia announced a successful


demonstration of a private LTE network for Industrial IoT. As the news describes,
“Industrial companies often have local connectivity needs and operate in remote
locations or temporary sites, such as mines, power plants, offshore oil platforms,
factories, warehouses or ports—connectivity for these environments can be challenging.
A standalone LTE network to serve devices and users within a localized area can help
improve performance and reliability for these industrial settings.

Edge gateway: A gateway is the buffer between where edge computing processing is
done and the broader fog network. The gateway is the window into the larger
environment beyond the edge of the network.

Fat client: Software that can do some data processing in edge devices. This is opposed
to a thin client, which would merely transfer data.

Edge Computing Equipment:Devices like sensors and machines can be outfitted to


work in edge computing environments by making the internet accessible.

Department of Computer Scince and Engineering,KIT 4


EDGE COMPUTING IN IOT 2022-23
CHAPTER-3

OVERVIEW OF EDGE COMPUTING


Edge Computing is a distributed computing paradigm in which processing and
computation are performed mainly on classified device nodes known as smart devices
or edge devices as opposed to processed in a centralized cloud environment or data
centers.

Edge computing is a “mesh network of micro data centers that process or store critical
data locally and push all received data to a central data center or cloud storage
repository, in a footprint of less than 100 square feet,” according to research firm IDC.

Edge computing is a method of optimizing cloud computing systems by performing


data processing at the edge of the network, near the source of the data. This reduces the
communications bandwidth needed between sensors and the central data center by
performing analytics and knowledge generation at or near the source of the data. This
approach requires leveraging resources that may not be continuously connected to a
network such as laptops, smartphones, tablets and sensors.

Fig 1: Overview of Edge computing

Department of Computer Scince and Engineering,KIT 5


EDGE COMPUTING IN IOT 2022-23
Edge computing covers a wide range of technologies including wireless sensor
networks, mobile data acquisition, mobile signature analysis, cooperative distributed
peer-to-peer ad hoc networking and processing also classifiable as local cloud/fog
computing and grid/mesh computing, dew computing, mobile edge computing, cloudlet,
distributed data storage and retrieval, autonomic self-healing networks, remote cloud
services, augmented reality, and more.

It is typically referred to in IoT use cases, where edge devices would collect data –
sometimes massive amounts of it – and send it all to a data center or cloud for
processing. Edge computing triage's the data locally so some of it is processed locally,
reducing the back haul traffic to the central repository.

Typically, this is done by the IoT devices transferring the data to a local device that
includes compute, storage and network connectivity in a small form factor. Data is
processed at the edge, and all or a portion of it is sent to the central processing or
storage repository in a corporate data center, co-location facility or IaaS cloud.

In Industrial Internet of Things (IIoT), applications such as power production, smart


traffic lights, or manufacturing, the edge devices capture streaming data that can be used
to prevent a part from failing, reroute traffic, optimize production, and prevent product
defects.

In the context of IIoT, 'edge' refers to the computing infrastructure that exists close to
the sources of data, for example, industrial machines (e.g. wind turbine, magnetic
resonance (MR) scanner, undersea blowout preventers), industrial controllers such as
SCADA systems, and time series databases aggregating data from a variety of
equipment and sensors. These devices typically reside away from the centralize
computing available in the cloud.

The role of edge computing to date has mostly been used to ingest, store, filter, and send
data to cloud systems. We are at a point in time, however, where these computing
systems are packing more compute, storage, and analytic power to consume and act the
data at the machine location. This capability will be more than valuable to industrial
organizations it will be indispensable.

Department of Computer Scince and Engineering,KIT 6


EDGE COMPUTING IN IOT 2022-23
CHAPTER - 4

WORKING OF EDGE COMPUTING

Fig 2: Working of Edge computing


Edge computing pushes applications, data and computing power (services) away from
centralized points to the logical extremes of a network. Edge computing replicates
fragments of information across distributed networks of web servers, which may spread
over a vast area. As a technological paradigm, edge computing is also referred to as
mesh computing, peer-to-peer computing, autonomic (self- healing) computing, grid
computing, and by other names implying non-centralized, nodeless availability.

To ensure acceptable performance of widely dispersed distributed services, large


organizations typically implement edge computing by deploying Web server farms with
clustering. Previously available only to very large corporate and government
organizations, edge computing has utilized technology advances and cost reductions for
large-scale implementations have made the technology available to small and medium-
sized businesses.

The target end-user is any Internet client making use of commercial Internet application
services. Edge computing imposes certain limitations on the choices of technology
platforms, applications or services, all of which need to be specifically developed or
configured for edge computing.

Department of Computer Scince and Engineering,KIT 7


EDGE COMPUTING IN IOT 2022-23
CHAPTER - 5

ARCHITECTURE OF EDGE COMPUTING

Fig 3: Architecture of edge computing


Edge Computing Architecture Edge Computing architectures are traditionally composed
by several layers playing an essential role in the successful execution of the associated
paradigm. Figure 3 show the schematic architecture. which are thus categorized
according to the following deployment models:

•Cloud Computing: This refers to computing resources (small cluster) connected via
WLAN to the end-users. In general, it can be considered as a “data centre in a box”
which provides support (computing and storage) to the end-users over the WLAN
network. Cloudlet Computing is based on three layers: the component layer, the node
layer, and the cloudlet layer. This is designed to have higher bandwidth, thus lowering
the latency for the applications.

•Fog Computing: a decentralized computing resource that can be placed anywhere


between the cloud and the end-users. It is based on the so-called Fog Computing Nodes
(FCNs) . All of these FCNs are heterogeneous, including switches, routers, and access
points. FCNs heterogeneous environment facilitates the devices at different protocol
layers and non-IP based technologies to communicate between the FCNs and the end
device. These FCNs are hidden for the end-users, thus ensuring security.
Department of Computer Scince and Engineering,KIT 8
EDGE COMPUTING IN IOT 2022-23
•Multi-access Edge Computing (MEC): which refers to implementing Edge
Computing within the Radio Access Network to reduce the latency. Formally known as
Mobile Edge Computing, it is an ETSI defined network architecture located closer to
the Radio Network Controller or macro base station. The edge organizes the MEC,
provides network information about load and capacity, and offers information to the
end-users about their location and network information.

•IoT (Internet of Things):contains a large set of devices and sensors that produce a
huge volume of data. These also exchange the data through a modern communication
network and monitor and control the infrastructure.
Typically, end-users at the Edge use the IoT devices and sensors. In general, Edge
Computing involves complex or heterogeneous architecture. It is hard to ultimately
make use of this complex architecture for some Edge Computing applications. The
following list provides more description about some of the important software platforms
in Edge Computing.

characteristics IOT Edge Fog Cloud

Deployment Distributed Distributed Distributed Centralized

Components Physical Edge Nodes Fog Nodes Virtual


devices Edge resources
Location Aware Aware Aware Aware
awareness
Computational Limited Limited Limited Unlimited
Limits
Storage Limits Very limited limited limited Unlimited

Data Source Process Process Process


Distance to data The source The nearest Near Far
source
Response time No response The fastest Fast Slow
time
Nodes count The largest Very large Large Small

Table 1 : Main characteristics and functionality within Edge Computing

Virtualization refers to an abstraction of an Operating System (OS), computing


resources, storage device, and/or network devices. Especially in computing, the term
virtualization often implies the reference to the creation of a Virtual Machine (VM)
managed by a hypervisor, a middleware responsible for providing an abstraction or

Department of Computer Scince and Engineering,KIT 9


EDGE COMPUTING IN IOT 2022-23
emulation layer from the hardware. The hardware running the hypervisor is called the
host whereas all emulated VMs running inside them are referred to as guests.

Data sources: As the input, any endpoint which records and collects data from clients
or its environments is described as a data source.

Artificial intelligence: As the processing function, it is the main phase after data
collected to uncover practical observations, locate patterns and trends, produce
individualized recommendations, and improve the performance based on machine
learning or data analytics models

Fig 4 : Sources of architecture layers

5.1 : PRIVACY AND SECURITY IN EDGE COMPUTING

Pseudonymity: where the pseudonym is used as an ID to ensure that an individual can


utilize the source (e.g. pseudonym) without revealing the source’s real identity.
However, a user could still be responsible for usage.

Unobservability: assuring that an individual could utilize a resource or service without


other third parties and having the ability to observe that the resource or service is being
used.

Department of Computer Scince and Engineering,KIT 10


EDGE COMPUTING IN IOT 2022-23
Unlinkability: ensuring that a third party (e.g., an attacker) cannot identify whether two
objects are linked to each other or not.

Anonymity: an individual may make use of a resource without revealing his identity.

Confidentiality: assuring only the data proprietor and an individual can access the
personal information in the edge computing. It protects against unapproved parties’
access to the data when the individual’s data is transferred and also collected in edge or
core network frame work, as well as when the data is kept or handled in edge or cloud
nodes.

Integrity: assuring the proper and steady transmission of data to the accredited
individual without unauthorized modification of the data. Privacy of individuals can be
impacted due to the lack of integrity measures.

Availability: ensuring the accredited party manages to access the edge services in any
regions based on individuals’ needs. This also implies that an individual’s data held in
edge or cloud nodes along with the cipher text format can be handled under various
practical needs.

5.2 MEASURES AND RISK REDUCTION


Strong Password Policy: ensure that individuals comply with the ideal security
password policies. Passwords should not be a thesaurus word, but have high entropies,
i.e., a mixture of lowercase and uppercase letters with a combination of special
characters. Random password generators could be utilized for generating strong
passwords.

Encryption: organizations need to encrypt inbound and outbound communications by


using the state-of-the-art ciphers and continuously have a disaster recovery backup plan
to be prepared for potential data violations or breaches.
Two-Factor Authentication (2FA): by making use of 2FA, people are required to
verify their identities, which is after they have initial access after entering their
username and password.It improves security by imposing one more level of checking

Department of Computer Scince and Engineering,KIT 11


EDGE COMPUTING IN IOT 2022-23
and verification based upon elements like ATM PIN, password, bio metrics (e.g.,
voiceprint and iris patterns). In addition, 2FA could be further categorized as follow.

SMS texting and voice-based: a code received by an SMS text; and reading the
numbers aloud via an automated voice call for secure login.

Hardware tokens: a small hardware device with a built-in screen to generate a one-
time password (OTP) for each transaction.

Software application tokens: a replacement of traditional hardware token, which is a


secure software application installed in an token app downloaded to an end-user’s smart
phone.

Push notification: a pop-up “push” message that turns up on a user’ device through the
internet to validate the identity of the user as a second-factor authentication.

Department of Computer Scince and Engineering,KIT 12


EDGE COMPUTING IN IOT 2022-23
CHAPTER - 6

CASE STUDY OF EDGE COMPUTING

 Smart parking system

Fig 5: Smart parking system

IOT parking management software

A parking lot management system can be a one-stop shop, uniting parking facility
managers, law enforcement agencies, drivers, and other stakeholders into a connected
network. Parties affected by the transformation of parking management make
contribution to the overall well-being of urban communities by connecting with each
other, ask and answer questions.

To function properly, parking management systems based on the Internet of Things


must make full use of the advantages of intelligent parking technology. Here are the
features that an intelligent platform should take advantage of in the parking industry:

 The screen displays the available and occupied parking Spaces. Iot platforms,
ideally cloud-based, should aggregate sensor data and turn it into a clear and
concise view of the facility’s parking space occupancy.
 Monitor parking occupancy in real time from any PC or smartphone. Drivers should
be able to see how many free parking Spaces are available near all parking facilities

Department of Computer Scince and Engineering,KIT 13


EDGE COMPUTING IN IOT 2022-23
in real time. An interactive occupancy map is necessary for an efficient, connected
parking management tool.
 API for end users and management applications. Due to the impact of a parking
management tool is vital to the well-being of community members, program
developers need to guarantee that the tool provides third-party integration and can
be implemented into other management and parking lot monitoring tools.
 Access rights,friendly interface for different user groups. Not every driver is
proficient and experienced at navigating platforms. To make searching or checking
a parking lot as easy as possible, app developers should insist a minimalist interface
and use guiding elements like arrows and ICONS to help users move around the
app. App developers should target different user groups, such as visually impaired
people, drivers over 50, etc.

Fig 6 : Architecture of smart parking system

Flow of Execution: A common flow of execution works as follows for a smart parking
system. First we have to Log in to the smartphone parking application. After that
Choose the parking area near the customer’s location. And Browse between randomly
available parking slots, then select a preferable slot. After preferring the slot elect the
desired time frame to park the vehicle and Pay off the parking fee for a chosen time
frame. When a customer parks the car via navigation and confirms his parking, the time
countdown starts. On departure, the customer can pay any additional charge if he
exceeds the allowed time.

Department of Computer Scince and Engineering,KIT 14


EDGE COMPUTING IN IOT 2022-23
Benefits:
Smart parking may minimize traffic for an automobile navigating for a slot, can be
useful for many people and decrease vehicles emissions, making for an even more
environment friendly city. It can also boost accessibility for businesses and grocery
stores by enhanced optimization of available parking slots.

6.1 EDGE COMPUTING IN AUTONOMOUS VEHICLE

Usecases:
Autonomous driving can be classified into six different levels, from traditional vehicles
being Level 0 to fully autonomous vehicles being Level 5. Additionally, within this
classification, Advanced Driver-Assistance Systems (ADAS) start at Level 1 and extend
to Level 4. ADAS offers semi-autonomous features to the vehicle and is the first step
towards fully autonomous vehicles.

1.Data Consumption by Autonomous Vehicles: At present, vehicles are not fully


autonomous. However, as vehicles increasingly shift from Level 1 to Level 5 autonomy,
more decision-making capability will be given to the vehicle. In turn, the data consumed
by the vehicle will increase, as the level of autonomy increases, because it has to make
more decisions. Specifically, Level 1 vehicles consume 3 gigabytes per hour, whereas
Level 5 vehicles consume 50 gigabytes per hour. Indeed, Level 5 vehicles consume
almost 17 times more data than Level 1 vehicles.
Examples of the data consumption by autonomous vehicles includes i) analyzing traffic
patterns, ii) observing road conditions and iii) helping the driver make decisions. For
example, Cruise, which is majority-owned by General Motors is producing very
sophisticated autonomous vehicles. Furthermore, Cruise plans to begin testing these
vehicles in San Francisco in late 2020.

In effect, autonomous vehicles are driving computers, functioning like a mini-data


center. Autonomous vehicles are constantly aggregating, creating, sending, and
receiving data. Numerous applications run on a vehicle and thus, significant Internet of
Things information is being sent from a diagnostics perspective.

2.Requirements for Constant Connectivity: Connectivity is critical for autonomous


vehicles. However, even Level 4 or Level 5 autonomous vehicles do not need to have

Department of Computer Scince and Engineering,KIT 15


EDGE COMPUTING IN IOT 2022-23
the vehicle connected 24/7, with 99.999% uptime. This is because much of the mapping
data that autonomous vehicles need to operate is already applied through artificial
intelligence.

However, the autonomous vehicle does have to keep reading the conditions of the road
and needs to keep transmitting data back-and-forth, between itself and a data center. By
keeping this communication in-place with a data center, it allows the autonomous
vehicle to learn and make decisions as it drives.In contrast, advanced driver-assistance
programs (ADAS) or semi-autonomous vehicles, can rely on GPS and Internet of
Things information to function.

3.Network and Digital Infrastructure for Autonomous Vehicles:Presently,


autonomous vehicles driving on major highways, under stable conditions, can virtually
drive themselves. This current autonomous vehicle functionality relies on significant
Internet of Things infrastructure. In turn, the Internet of Things depends on mobile
infrastructure, including towers. Furthermore, autonomous vehicles use artificial
intelligence workloads, which require processing in data centers.

Ultimately, to enable autonomous vehicles to perform at their highest level, they need to
run on a well-built 5G network. In turn, digital infrastructure supports this 5G network.

4.Towers and Autonomous Vehicles: Tower coverage is a critical component to ensure


that autonomous vehicles can function at scale. Presently, ~99% coverage of roads with
towers has been achieved across the United States. This includes coverage of all major
interstate highway systems.

However, the secondary, state and county roads are more difficult to cover, from an
economic standpoint. Therefore, it will take time for 100% of roads in the United States
to have coverage by towers. Indeed, for autonomous vehicles to fully function, they
need full coverage of roads by towers.

5.Edge Compute and Autonomous Vehicles: Edge compute is another critical


component to ensure that autonomous vehicles can function at scale. Artificial
intelligence processing cannot be done in the cloud, and sent back to the vehicle. This is
because there is too much latency in that round-trip path. Therefore, all that processing

Department of Computer Scince and Engineering,KIT 16


EDGE COMPUTING IN IOT 2022-23
needs to be done at edge data center locations. These edge data centers can mitigate the
latency issues of the cloud, by being physically closer to the vehicle.

In order to allow the autonomous vehicle to make decisions quickly, a low-latency


environment is necessary. Low-latency allows information to transmit back-and-forth
between the vehicle and the server, housed in the edge data center. In this environment,
the server can iterate back-and-forth with the vehicle, and decisions can be made in
milliseconds.As a result of this new edge compute architecture, base stations and
applications can no longer just reside in the city center. Instead, base stations and
applications will need to also reside in the suburbs and transportation corridors. Indeed,
the suburbs and transportation corridors are where much of the driving by autonomous
vehicles will occur.

6. Digital Infrastructure Providers: As an example, digital infrastructure


provider Colony Capital is using its extensive portfolio which comprises ~29k towers,
95+ data centers, >140k fiber route miles and >40k small cell & distributed antenna
system nodes to help facilitate autonomous vehicles. Specifically, Colony has partnered
in autonomous driving with major auto manufacturers, Uber, and semiconductor
company Nvidia.

6.2 EDGE COMPUTING IN 5G NETWORK


when 5G first started gaining popularity, scientists set some incredibly high standards
for the new technology regarding how much it would reduce latency.While telecom
operators report that 5G in the lab can deliver network speeds more than twenty times
faster than 4G, this isn’t reflected in the average user’s experience. Well, at least not
with 5G alone.

This is where Edge computing comes in, with experts predicting that 5G will need to
rely on Edge computing to reach these impressive targets.By installing data processing
for 5G on the Edge, there is a significant reduction in the time it takes to process
data. Edge Computing, operating at the network’s edge, stores all its data locally and
doesn’t need to interact with the cloud. It has set commands for the jobs it needs to
perform.

Data is processed in real-time by putting 5G data processing on the Edge of the network.
Additionally, the security advantage that the Edge offers gives the 5G network further

Department of Computer Scince and Engineering,KIT 17


EDGE COMPUTING IN IOT 2022-23
protection from hackers and technological mishaps, as it is not connected to the broader
network.Furthermore, with the slow-go cycle that 5G operators are taking, the Edge is
key to ensuring that coverage reaches all necessary locations sooner. Full 5G won’t be
sufficient to cover everything on its own, but with Edge Computing, it can communicate
effectively with whatever application and appliances it’s connected to.

Using the cloud for such work will quickly become expensive, not to mention slower.
As a result, consumer experience will deteriorate, and 5G will not be able to handle
processing responsibilities using the cloud alone. Having the entire system travel
through local Edge networks, where the information can be picked apart and
rationalized before it’s sent to a centralized cloud, vastly improves the processing
procedure.

This further incentivizes application creators to use the new 5G network, thus allowing
it to grow alongside Edge Computing.

Department of Computer Scince and Engineering,KIT 18


EDGE COMPUTING IN IOT 2022-23
CHAPTER-7

CONCLUSION
In this report, I came up with the understanding of edge computing, with the rationale
that computing should happen at the proximity of data sources. In this report, we
investigated,highlighted,and reported recent primer advances in edge computing
technologies(e.g., fog computing, MEC and cloudlets) with respect to measuring their
affect on IoT.Then, we categorized edge computing literature by devising a taxonomy,
which was used to uncover the premium features of edge computing that can be
beneficial to the IoT paradigm. We outlined a few key requirements for the deployment
of edge computing in IoT and discussed indispensable of edge computing in IoT.
Furthermore several open research challenges to the successful deployment of edge
computing in IoT are identified and discussed.

I conclude that although the deployment of edge computing in IoT provides numerous
benefits, convergence of these two computing paradigm brings about new issues that
should be resolved in the future.

Department of Computer Scince and Engineering,KIT 19


EDGE COMPUTING IN IOT 2022-23

REFERENCES

1secure edge computing in IoT systems: Review and case studies, Mohammed
Alwaily Department of Electrical Engineering university of south Florida.
2The role of edge computing in Internet of things , Najmul Hassan, Saira Gillani, Ejaz
Ahmed IEEE,2018.
3M.Sathyanayanan et al.,”Edge Anaslytics in the internet of Things,” IEEE Pervasive
Computing,vol. 14,no.2,2015.

Department of Computer Scince and Engineering,KIT 20

You might also like