Edge Computing


Book Description

The book aims to focus only on the 'edge computing' paradigm - as opposed to other similar disciplines such as fog computing - due to its unique characteristics where heterogeneous devices can be equipped with decision-making processes and automation procedures to carry out applications (mostly) across widely geographically distributed areas. The book is sectioned into three parts (models, technologies and applications) to reflect complementary viewpoints and shed light onto various aspect of edge computing platforms. The first part (models) serves as an introductory section to differentiate edge computing from its fairly close/similar paradigms such as fog computing, multi-access edge computing and mobile cloud computing. It then highlights various theoretical models through which edge computing systems could be mathematically expressed and their relevant technological problems could be systematically solved or optimized. The second part (technologies) focuses on different technologies (virtualization, networking, orchestration, etc.) where edge computing systems could be realized. And finally, the third part (applications) focuses on various application domains (e.g., smart cities) where edge computing systems could, or already did, help in providing novel services beyond the reach of pure/typical cloud computing solutions.




Edge Computing – EDGE 2020


Book Description

This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020. The 7 full and 2 short papers presented in this volume were carefully reviewed and selected from 13 submissions. The conference proceeding EDGE 2020 presents the latest fundamental advances in the state of the art and practice of edge computing, identify emerging research topics, and define the future of edge computing.




Edge Computing


Book Description

This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate readers to setup edge-based environment and work with edge analytics. It covers important topics, including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication. Aimed at senior undergraduate, graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology, this text: Discusses edge data storage security with case studies and blockchain integration with the edge computing system Covers theoretical methods with the help of applications, use cases, case studies, and examples Provides healthcare real-time case studies elaborated by utilizing the virtues of homomorphic encryption Discusses real-time interfaces, devices, and simulators in detail




IoT and Edge Computing for Architects


Book Description

Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing. Key FeaturesBuild a complete IoT system that's the best fit for your organizationLearn about different concepts, tech, and trade-offs in the IoT architectural stackUnderstand the theory and implementation of each element that comprises IoT designBook Description Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains. What you will learnUnderstand the role and scope of architecting a successful IoT deploymentScan the landscape of IoT technologies, from sensors to the cloud and moreSee the trade-offs in choices of protocols and communications in IoT deploymentsBecome familiar with the terminology needed to work in the IoT spaceBroaden your skills in the multiple engineering domains necessary for the IoT architectImplement best practices to ensure reliability, scalability, and security in your IoT infrastructureWho this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, technologies, and trade-offs, and develop a 50,000-foot view of IoT architecture. An understanding of the architectural side of IoT is necessary.




Mobile Edge Computing


Book Description

This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.




Network Management in Cloud and Edge Computing


Book Description

Traditional cloud computing and the emerging edge computing have greatly promoted the development of Internet applications. But what are the key issues in these two trends and what are the differences between them? This book systematically introduces several key procedures in both cloud computing and edge computing scenarios, with each chapter providing a detailed description of novel design. In addition, the book also discusses a series of important findings from industry collaborations, which greatly enhance our understanding of the real system of industry. This book is not only a valuable reference resource for researchers, but also provides large-scale deployment cases for real systems in industry. In order to gain the most benefit from this book, readers should have some the basic knowledge of computer networks.




Cases on Edge Computing and Analytics


Book Description

Edge computing and analytics are fascinating the whole world of computing. Industry and business are keenly embracing this sound concept to develop customer-centric solutions by enhancing their operations, offerings, and outputs. There is a bevy of advancements in this domain that came with the arrival of IoT devices. The seamless convergence of microservices and serverless computing creates vast opportunities. With the help of IoT devices and these other developments, there has become a deep interest in business automation and additional improvisations in edge computing. With the steady growth of edge devices and applications of IoT fog/edge computing and analytics, there are also distinct challenges and threats. Research has been keenly focused on identifying and understanding these issues and shortcomings to bring viable solution approaches and algorithms. Cases on Edge Computing and Analytics describes the latest innovations, improvements, and transformations happening with edge devices and computing. It addresses the key concerns of the edge computing paradigm, how they are processed, and the various technologies and tools empowering edge computing and analytics. While highlighting topics within edge computing such as the key drivers for implementation, computing capabilities, security considerations, and use-cases, this book is ideal for IT industry professionals and project managers, computer scientists, computer engineers, and practitioners, stakeholders, researchers, academicians, and students looking for research on the latest trends and transitions in edge computing.




Multi-Access Edge Computing in Action


Book Description

This book provides a complete and strategic overview of Multi-Access Edge Computing (MEC). It covers network and technology aspects, describes the market scenarios from the different stakeholders’ point of view, and analyzes deployment aspects and actions to engage the ecosystem. MEC exists in and supports a highly complex "5G world" in which technologists and non-technology decision makers must act in concert and do so within a large interconnected ecosystem of which MEC is just one, albeit an important, part. Divided into three sections, with several chapters in each, the book addresses these three key aspects: technology, markets, and ecosystems.




The Cloud-to-Thing Continuum


Book Description

The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.




Artificial Intelligence for Cloud and Edge Computing


Book Description

This book discusses the future possibilities of AI with cloud computing and edge computing. The main goal of this book is to conduct analyses, implementation and discussion of many tools (of artificial intelligence, machine learning and deep learning and cloud computing, fog computing, and edge computing including concepts of cyber security) for understanding integration of these technologies. With this book, readers can quickly get an overview of these emerging topics and get many ideas of the future of AI with cloud, edge, and in many other areas. Topics include machine and deep learning techniques for Internet of Things based cloud systems; security, privacy and trust issues in AI based cloud and IoT based cloud systems; AI for smart data storage in cloud-based IoT; blockchain based solutions for AI based cloud and IoT based cloud systems.This book is relevent to researchers, academics, students, and professionals.