Sie sind auf Seite 1von 6

EDGE COMPUTING

EDGE COMPUTING

Introduction

1. Edge computing is already in use all around us – from the


wearable on your wrist to the computers parsing intersection traffic
flow. Other examples include smart utility grid analysis, safety
monitoring of oil rigs, streaming video optimization, and drone-enabled
crop management.

2. As applications appear poised to expand. Today, less than 10


percent of enterprise-generated data is created and processed at the
edge.

3. Edge computing is computing that’s done at or near the source


of the data, instead of relying on the cloud at one of a dozen data
centers to do all the work. It doesn’t mean the cloud will disappear. It
means the cloud is coming to you.

Need For Edge Computing

4. Latency. One great driver for edge computing is the speed of


light. If a Computer A needs to ask Computer B, half a globe away,
before it can do anything, the user of Computer A perceives this delay
as latency. The brief moments after you click a link before your web
browser starts to actually show anything is in large part due to the
speed of light.

5. Privacy And Security . While the proliferation of IoT edge


computing devices does increase the overall attack surface for
networks, it also provides some important security advantages.
Traditional cloud computing architecture is inherently centralized,
which makes it especially vulnerable to distributed denial of service
(DDoS) attacks and power outages. Edge computing distributes
processing, storage, and applications across a wide range of devices

and data centers, which makes it difficult for any single disruption to
take down the network.
6. Scalability As companies grow, they cannot always
anticipate their IT infrastructure needs, and building a dedicated data
center is an expensive proposition. In addition to the substantial up-
front construction costs and ongoing maintenance, there’s also the
question of tomorrow’s needs. Traditional private facilities place an
artificial constraint on growth, locking companies into forecasts of their
future computing needs. If business growth exceeds expectations, they
may not be able to capitalize on opportunities due to insufficient
computing resources.

7. Versatility The scalability of edge computing also makes


it incredibly versatile. By partnering with local edge data centers,
companies can easily target desirable markets without having to invest
in expensive infrastructure expansion. Edge data centers allow them to
service end users efficiently with little physical distance or latency. This
is especially valuable for content providers looking to deliver
uninterrupted streaming services. They also do not constrain
companies with a heavy footprint, allowing them to nimbly shift to other
markets should economic conditions change.

8. Reliability By processing data closer to the source and


prioritizing traffic, edge computing reduces the amount of data flowing
to and from the primary network, leading to lower latency and faster
overall speed. Physical distance is critical to performance as well. By
locating edge systems in data centers geographically closer to end
users and distributing processing accordingly, companies can greatly
reduce the distance data must travel before services can be delivered.
These edge networks ensure a faster, seamless experience for their
customers, who expect to have access to their content and
applications on demand anywhere at any time.

ARCHITECTURE

9. The increase of IoT devices at the edge of the network is


producing a massive amount of data to be computed to data centers,
pushing network bandwidth requirements to the limit. Despite the
improvements of network technology, data centers cannot guarantee
acceptable transfer rates and response times, which could be a critical
requirement for many applications.

10. Furthermore devices at the edge constantly consume data


coming from the cloud, forcing companies to build content delivery
networks to decentralize data and service provisioning, leveraging
physical proximity to the end user. In a similar way, the aim of Edge
Computing is to move the computation away from data centers
towards the edge of the network, exploiting smart objects, mobile
phones or network gateways to perform tasks and provide services on
behalf of the cloud.

11. By moving services to the edge, it is possible to provide content


caching, service delivery, storage and IoT management resulting in
better response times and transfer rates.
CHALLENGES FOR EDGE COMPUTING

12. Network bandwidth. As more data is stored at the edge and


more compute happens at the edge, network bandwidth will shift.
Traditionally, enterprises allocate higher bandwidth to data centers and
lower bandwidth to the endpoints. Now, a challenge with edge
computing is the need to balance more bandwidth across the network.

13. Distributed computing. Businesses will need to take location


into consideration as an additional aspect of compute. Consolidated
compute models are dissipating; computing now needs to include
networking as a key element, with a greater focus on east-west traffic.

14. Security. When compute resources and applications are


centralized in a data center, enterprises can standardize both technical
security and physical security. It's possible to build a wall around the
resources for easier security. But edge computing forces businesses to
grapple with enforcing the same network security models and the
physical security parameters for more remote servers. The challenge is
the security footprint and traffic patterns are all over the place.

15. Backup. The need for edge computing typically emerges


because disparate locations are collecting large amounts of data.
Enterprises need an overall data protection strategy that can
comprehend all this data. Network bandwidth requirements will be just
as critical as storage media considerations when deciding how to
protect these assets, because backup over the network may not make
sense.

16. Data accumulation. Data is a key business asset, and


collecting it at the edge brings new challenges and can create liabilities
if it's not handled in accordance with existing data handling rules. Data
storage and access are critical, both of which will need to encompass
the network as part of the data lifecycle.
THE RISKS OF EDGE COMPUTING

17. Edge computing processes and analyzes only a subset of data,


discarding raw information and incomplete insights. Companies must
consider what level of information loss is acceptable.

18. Edge computing can increase attack vectors. With the addition
of the IoT, network-connected devices, and built-in computers, the
opportunities have increased for attacks and malicious hackers to
infiltrate the devices and access sensitive data.

19. Edge computing requires more local hardware. For example,


IoT cameras require a built-in computer to send video data over the
internet as well as a more sophisticated computing process for more
advance process applications, such as motion-detection or facial-
recognition algorithm.

THE INEVITABLITY OF EDGE COMPUTING

20. Edge computing is the inevitable evolution of cloud-based


systems. As the world of technology continues to expand, the reach of
the IoT will grow, as well, eventually connecting most electronics and
computer-driven devices. In addition, the massive amount of idle
computing resources that sit unused “at the edge” can be harvested for
use, creating a cloud resource thousands of times larger than the one
currently in use.

21. From the IoT to devices’ processors, sensors, and network


connectivity, companies must be on the lookout for anything to help
them stay in touch, remain connected, and get ahead. Until now, the
best way to do that was a cloud-based solution. Now, companies may
want to reevaluate their needs and goals and step to the edge.

Das könnte Ihnen auch gefallen