Edge Computing: The State of Practice
Edge computing has recently emerged as a remedy to known limitations of cloud computing for certain classes of internet-of-things (IoT) applications. These include large-scale distributed control systems, mobile applications comprising of roaming users and moving objects as well as privacy sensitive applications that need to isolate specific datasets. Edge computing supports the above-listed applications by enabling data collection, storage and processing close to the physical world, along with real-time actuation and control. Based on these characteristics, edge computing deployments are expected to find their place in both industrial settings (e.g., factories, energy plants, oil refineries) and consumer applications (e.g., smart homes, smart cities and ambient assisted living applications).
Many enterprises are already deploying elements of edge computing in their applications. At the same time, vendors are developing edge computing platforms, which can be flexibly configured for deployment in different environments. Understanding the state of play, is therefore a key prerequisite for shaping your edge computing strategy.
Edge computing is characterized by the deployment of one or more layers of edge nodes between the field and the cloud. Edge nodes can be of different types with varying computational capabilities, ranging from CPU constrained devices such as Arduino boards to industrial PCs, or even mini-clusters of servers. In most deployments a layer of resource constrained nodes interfaces to some computationally intensive device, which is characterized as edge “gateway”. Gateways are in turn integrated with the cloud, and therefore benefit from the capacity, scalability and quality of service of cloud computing infrastructures. Edge nodes and gateways preprocess and filter data in order to stream to the cloud only the data that have significant business value.
The structure of edge computing deployments is specified in the scope of reference architectures which have been produced by standards development organizations, such as the Industrial Internet Consortium Reference Architecture and the OpenFog consortium. These architectures specify the structuring principles that drive the integration of edge computing systems at scale, including systems that comprise of multiple layers of edge nodes. They also prescribe the implementation of security mechanisms at multiple levels, including the levels of field devices, edge servers/gateways and the cloud. Moreover, they include some tangible examples and deployment configurations, which facilitate the understanding of how these architectures work in practice.
Along with the release of reference architectures, we are also witnessing the emergence of edge computing platforms. Some prominent examples include:
Note that these are only few representative examples of tangible edge computing platforms by major vendors. As evident from the given descriptions, each vendor is striving to provide a unique value proposition for its edge computing implementation (e.g., deployment ease, configurability, scalability, standards compliance) as a means to standing out in the competition.
In the coming years, edge computing platforms will become mainstream components of every sort of IoT deployment. Several of these platforms are likely to comply with the introduced reference architectures. We also expect the implementation and integration of innovative technologies over mainstream edge computing platforms, including the following disruptive technologies:
Edge computing is destined to go hand in hand with IoT, as it provides the means for deploying real-time IoT applications in a way that optimizes bandwidth, latency and storage costs. Therefore, we expect to see a proliferation of edge computing deployments, which will give rise to the development of innovative platforms with a host of value added features.
Getting the most from your Multi-Cloud Environment
AIOps: Empowering Automated and Intelligent Cloud Operations
Cloud Leaks: The basics you need to know
Data Modernization and the Cloud: A “Chicken-and-Egg” Relationship
Seven Cloud Security Challenges and Their Solutions
API Management: A Powerful Tool for Creating Business Value
Hyperautomation: The Basics you need to Know
Outsourcing: How to Pick the Right Partner and Location
Digital Twins: A Vehicle for Safer, Trusted and More Efficient Industrial Processes
Surviving Cybercrime in 2021: Guidelines for Effective Cybersecurity Investments
We're here to help!
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
If you are a Service Provider looking to register, please fill out
this Information Request and someone will get in
Enter your email id and we'll send a link to reset your password to the address
we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is
no cost to get on-board;
if you are competent in your areas of focus, then you are welcome. As a part of this exclusive