Topics In Demand
Notification
New

No notification found.

292

0

The number of Internet of Things (IoT) devices worldwide is forecast to almost triple from 9.7 billion in 2020 to more than 29 billion IoT devices in 2030.

Most of IoT devices are enabled using Cloud Computing.

With such a growth there would be an exponential increase in volume and movement of data to a datacentre/cloud and back.

Every advancement of technology gives birth to many other innovative approaches to meet the challenges of future and provide more efficient way of things.

Edge Computing is one such approach to lower latency and reduction in transmission cost.

Simply put, Edge computing is a model to enable the processing of some part of data near to the place where it is being generated and avoid sending large volumes of data to and from a cloud/ datacentre.

A Simpler Definition: “The concept of computing near the source of data generation is known as Edge Computing”

Let’s try to understand this with a simple analogy:

Visit the OPD of any large hospital. Before you meet the specialist doctor, the nursing staff examine you and note your vitals (BP, Heartbeat, Temperature etc.)

This is noted down and shared with the doctor before he sees you.

When the doctor sees you, he would examine you in accordance with the vitals noted.

This process is practiced to reduce the workload on the Doctor so that he can focus on ensuring the best examination and treating more patients.

So in a way, a small bit of processing is being done at the local level (eg. at nursing staff level) before it is sent to the cloud/data center (eg. sat Doctor level)

Though this is a very simplistic way of putting, but easy to understand the concept.

Another analogy:

Most of the ATMs are enabled with a Security camera that records the movements and keeps uploading the recordings to the datacentre/cloud.

In case of an adverse event near the ATM, these recordings help in identifying and tracking the culprit.

This is more of a “post-event” scenario when the damage has already occurred.

With the Edge Computing approach, enabled with AI, the same setup can be used as a preventive mechanism.

A local processing device located geographically near the camera (the point of data generation) can be programmed to track any undesired movement/ action and a trigger can be alerted.

Please note such a solution would ask for a good amount of planning to ensure Data Privacy and Security.

What could be the different areas which would benefit from Edge Computing.

With the kind of improved efficiency provided by the Edge Computing approach, there could be many areas that may benefit. Few are listed below:

  • Manufacturing
  • Agriculture
  • Security and Worker Safety
  • Retail Applications
  • Traffic Management Systems
  • Industrial Process Monitoring
  • Autonomous Vehicles

5G and Edge Computing

5G is the Fifth Generation of cellular technology and would provide higher speed, lower latency, and much greater capacity than earlier networks.

Developing an Edge Computing based ecosystem on 5G network can open an amazing range of value-based services and solutions.

This can tremendously improve the performance of existing applications and facilitate advanced analytics along with real-time data -ingestion.

Benefits of Edge Computing:

  1. Improves Time to Action
  2. Reduces Response Time
  3. Conserves Network Resource
  4. Reduces Data Bottleneck
  5. Enables 5G Connectivity

Cons of Edge Computing:

  • Security Challenge (e.g. Data Privacy)
  • Licensing Costs
  • Configuration Challenge

Conclusion:

Edge Computing is going the be one of the exciting technologies in coming years, but the actual benefit from it would depend on how well we fit our solution in the real world and how we optimize the Total Cost of Ownership.

 


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


Navjyot Mitter is Co-Founder of OPTIMISTIK INFOSYSTEMS, serving Learning needs of IT Companies since last 10 years. My core interest lies in designing and organizing professional level training programs for IT Teams, helping in their Technology Readiness Journey. In free time I don the hat of a Yoga Practitioner and like to be with my Yoga group.

© Copyright nasscom. All Rights Reserved.