Скачать книгу

1.6.

       A reduction in data volume, as the task is performed at the edge.

       It reduces the consequent traffic and traveling distance of data.

       Low latency and transmission costs.

       It provides computing offloading in real-time applications, such as facial recognition with the low response time.Figure 1.5 The hierarchy of EC.Figure 1.6 The benefits of EC.

       Instead of using the resource-rich machines such as cloudlets in the vicinity of the mobile users in the case of CC, it is better to offload a few of the tasks at the edge node to reduce the execution time.

       EC optimizes data-driven and management capabilities by efficient facilitation of data gathering, processing, reporting, etc. very nearer to the end-user as possible.

      Privacy and security

      The distributed paradigm of EC allows data encryption using different mechanisms, hence provide added security. This is because the data can be transferred among several distributed nodes via the internet before arriving at the cloud. This introduces flexibility in security methods to be adopted, thus Edge nodes may suit resource-constrained devices. An eventual shift from centralized top-down cloud infrastructure to a suitable decentralized Edge model helps better the functioning of the network. Further, the edge data allows the shifting ownership of gathered data from service providers to end-users. On the contrary, CC is more vulnerable since all the data is fed to the cloud analyzer and a single attack can disrupt the entire system. As against it, the EC transfers fewer amounts of data that can be accessible to hackers or interceptors. So it helps industries to tackle local compliance, privacy regulations, and data sovereignty issues.

      Scalability

      In CC, it is essential to forward the data to a centrally located data center. Thus, the modification or expansion of the dedicated data centers remains expensive. On the other hand, the IoT devices can be deployed at the edge with their data management and processing tools in single implantation without waiting on the coordination efforts of personnel placed at multiple sites.

      Reliability

      Speed

      EC facilitates the availability of analytical computational resources in the vicinity of the end-users, hence can improve the speed of response. The presence of a small amount of data and its management to remote locations reduces the overall loads in the traffic. The reduction in latency can enhance the speed of communication at the user-end.

      Efficiency

      In EC the end-user remains at the proximity of the computing which allows the application of sophisticated Artificial Intelligence and analytical tools at the edge of a system. Such schemes improve the overall operational efficiency of the system.

      Cost Saving

      EC has to deal with less data that is relevant to the end-user. Removal of redundant data reduces the cost of data handling, transportation, storage, and management. Further, the bandwidth cost is also reduced as it needs to deal with large data management.

      Versatility

      EC remains versatile since industries can target the coveted markets with their local cen-ters with fewer infrastructure investments. In this way, the enterprises may allow expert assistance with latency. The efficiency of EC can further increase with the involvement of advanced IoT gadgets without changing the current IT structure.

      The Limitations of EC

      Table 1.1 shows the limitations of EC.

      Table 1.1 The limitations of EC.

Security It is often difficult to maintain the desired security in a distributed network such as EC. The security further at risk due to the transfer of data outside the network edge. Further, the infiltration or pilferage of data when a new IoT device is introduced.
Incomplete Data EC can analyze and process limited information and discard the rest of the data. Thus, there is a possibility of valuable information loss which compels the end-user to decide the type and amount of information before opting for such a scheme.
Investment Cost The implementation of an EC infrastructure remains complex and costly and complex since it requires additional resources and equipment. It requires more local hardware for functioning.
Maintenance

       1.3.2.3 IoT in Fog Computing (FC)

      FC reduces the amount of information to be carried into the cloud and improves efficiency by extending the cloud nearer to the data generating device known as the fog nodes. These fog nodes are in the form of controllers, switches, servers, routers, cameras, etc. which provide the desired storage, network connection, and computing features is known as fog node. In general, CC is incapable of handling large data bandwidth as it is subjected to volume and latency that’s leads to the advent of FC. It is found useful in compliance and data security and is a non-trivial extension of CC. It bridges several sensors appearing at the network edge to the core computing structure of the cloud [1, 23]. The system requires the processing to be carried out either on the network edge of a gateway device or router or in the data hub of the mobile device.

      Similarly, EC appears directly on the devices where the sensors or controllers are attached or it may appear at the gateway device physically nearer to the sensors. On the other hand, FC carries the edge activities to several processors connected to the LAN physically away from the sensors, controllers, and actuators.

      Advantages of FC

       Since in EC the storage and processing of data to take place in LAN, the technique allows the organizations for the aggregation of information from multi-devices to regional stores.

       The data processing capability of Fog architecture is larger than that of Edge as the former allows organizations to gather data from different various devices.

       It improves and helps the real-time processing capabilities of the Edge architecture.

       It is most suitable for structures that have to handle millions of devices sharing information between them. Скачать книгу