In 2015, 150 billion objects will be connected and will form the Internet of Things (IoT) in the world. Most of them will produce real-time data, which will represent 30% of the Data sphere. And this phenomenon of overbidding will not be the only fact machines: each of us will be connected and will produce an average of 4,900 times daily data, or 1 digital interaction every 18 seconds!
Whether in industry, with the revolution of Industry 4.0, in the world around us and host (smart city and smart building), in our connected car before being autonomous, or in our daily lives with our Smartphone and e-health, IoT and connected objects will be everywhere. The result will be the explosion of data volumes, in environments that today are far from being able to support it.
Already, there is the question of the ability of our information systems (IS) to support this infobiosity. Our legacy of centralized, physically-in-the-enterprise computing hosted at partners or in the public cloud does not lend itself to assuming connected data and processing. In addition, the infrastructures that support IoT data, transport and processing, are already bottlenecks and latency issues. But these are not compatible with the other phenomenon associated with IoT, the real time …
What is Edge Computing?
Edge Computing is a form of computer architecture that serves as an alternative to cloud computing. The amount of data generated by connected objects and other mobile devices (Smartphone and tablets) is exploding. In this context, specialists like Cisco’s Helder Antunes believe that it is unrealistic to think that all this data can be transmitted between their sources and the Cloud Data Centers in a stable and fast way for analysis.
However, companies in many industries such as manufacturing, health, telecommunications and finance need to be able to analyze the most important data as quickly as possible, almost at the same time as they are collected. Faced with this problem of the future, the Edge Computing could be the solution.
To put it simply, Edge Computing or data processing at the edge of the network is an open distributed computing architecture. It offers decentralized processing power. Most often, the Edge Computing is used in the field of the Internet of Things. Part of the vast amount of data collected by connected devices is processed locally to reduce traffic to the cloud or data centres and enable important data analysis in real time (or almost). The connected object usually transfers the data to a small local device capable of processing and storing. The data is thus processed at the edge of the network before being transmitted to the cloud or the data centre.
Benefits of Edge Computing
Edge Computing may be relevant in many situations. For example, when IoT connected objects have poor connectivity, it is not efficient to keep them connected to a central cloud at all times. Processing at the edge can Best Assignment Help UK to solve this problem.
Edge Computing also reduces the latency of information processing because data does not need to traverse a large network to reach a remote Data Centre or cloud server. This reduction in latency is particularly important in the areas of financial services or manufacturing. The Edge Computing could take off as part of the deployment of the 5G mobile network. The researcher predicts that telecom providers will be adding more and more Micro Data Centres to their 5G antennas to allow their business customers to rent space in these miniature data centres to reap the benefits of Edge Computing.
Security of Edge Computing
The security of Edge Computing is a big debate. In a sense, we can consider that security is higher on the periphery of the network because the data do not cross the network and remain close to their source. In fact, if a cloud environment or an internal Data Centre is compromised, the number of vulnerable data is minimized.
However, devices on the edge of the network are a priori more vulnerable than the Cloud or Data Centres. As a result, an Edge Computing environment may actually be less secure than a cloud environment or an internal Data Centre. In fact, to ensure the security of an Edge Computing environment, special care must be taken in security: data encryption, access control, use of a VPN are essential measures.
本文採用 創用 CC 姓名標示-相同方式分享 4.0 國際 授權條款授權.