Question

In: Computer Science

3)Edge (Fog) Computing (Data element analysis and transformation): You considered all possibilities that pertain to this...

3)Edge (Fog) Computing (Data element analysis and transformation): You considered all possibilities that pertain to this level, and express how you tested this level was secure. You provided evidence to justify your claims

PLEASE EXPLIN IN DETAILS

Solutions

Expert Solution

Edge Computing, a category of Fog Computing that focuses on processing and analysis at the network node level. Edge computing brings computation and data storage closer to the devices where it’s being gathered, rather than relying on a central location that can be thousands of miles away. With the development of the Internet of Things (IoT), a device could recognize the environment and conduct a certain function by itself. Therefore, roles of a computing model that controls IoT devicesare paramount. IoT devices mainly consist of sensors. Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. Transferring and processing huge amount of datat hrough cloud computing caused several issues such as delayed service response time. In addition, the number of application area of a sensor network is expanding and the demand on real-time processing and transferring of information to control a device of IoT is also increasing. Edge computing is a part of a distributed computing topology in which information processing is located close to the edge, where things and people produce or consume that information.

Edge (Fog) computing bridges the gap between the cloud and end devices i.e.IoT nodes by enabling computing, storage, networking, and data management on network nodes within the close vicinity of IoT devices. In addition, fog computing services that have been developed so far consist of data creation, processing and transfer. Fog nodes are wide-spread and geographically available in large numbers. In fog computing, security must be provided at the edge or in the dedicated locations of fog nodes, as opposed to the centrally-developed security mechanisms in dedicated buildings for cloud data centers. The decentralized nature of fog computing allows devices to either serve as fog computing nodes themselves. Fog enables repeatable structure in the edge computing concept, so enterprises can push compute out of centralized systems or clouds for better and more scalable performance.

Edge-computing hardware and services help solve this problem by being a local source of processing and storage for many of these systems. An edge gateway, for example, can process data from an edge device, and then send only the relevant data back through the cloud, reducing bandwidth needs. Or it can send data back to the edge device in the case of real-time application needs.

Edge computing is a concept that contrasts with cloud computing. Cloud computing is a way to communicate directly with a central data center, whereas edge computing communicates primarily with the so-called “edge data center,” which is located near the device, and leaves secondary work to the central cloud. In other words, edge computing is a computing topology concept. Physical devices and controllers that might control multiple devices. Devices are diverse, and there are no rules about size, location, form factor, or origin. Communications and connectivity are concentrated in Level 2. One objective of the IoT Reference Model is for communications and processing to be executed by existing networks. Connectivity includes:

  • Communicating with and between the Level 1 devices
  • Implementation of various protocols
  • Translation between protocols
  • Security at the network level

Increasingly, though, the biggest benefit of edge computing is the ability to process and store data faster, enabling for more efficient real-time applications that are critical to companies. The functions of Level 3 are driven by the need to convert network data flows into information that is suitable for storage and higher level processing at Level 4 (data accumulation). This means that Level 3 activities focus on high-volume data analysis and transformation. For example, a Level 1 sensor device might generate data samples multiple times per second, 24 hours a day, 365 days a year. A basic tenet of the IoT Reference Model is that the most intelligent system initiates information processing as early and as close to the edge of the network as possible. This is sometimes referred to as fog computing. Level 3 is where this occurs. It is clear that while the initial goal for edge computing was to reduce bandwidth costs for IoT devices over long distances, the growth of real-time applications that require local processing and storage capabilities will drive the technology forward over the coming years. Level 3 processing includes :

  • Evaluation: Evaluating data for criteria as to whether it should be processed at a higher level
  • Expanding/decoding: Handling cryptic data with additional context
  • Reducing and summarizing data to minimize the impact of data and traffic on the network and higher-level processing systems
  • Finally, Assessment: Determining whether data represents a threshold or alert; this could include redirecting data to additional destinations.

Related Solutions

You want to test a new instrument for ammonia analysis in fog water (basic fog is...
You want to test a new instrument for ammonia analysis in fog water (basic fog is associated with uncontrolled ammonia releases from waste lagoons containing agricultural waste from confined animal feedlot operations or CAFOs). First you have to check its operation against a standard reference solution of 100.00 micromolar ammonia. It reads 98.23, 88.16, 101.30, 101.47, 99.59 and 101.66 over six replicate measurements. Using α = 0.05 and a t-test, solve for if there is any evidence that the analysis...
Trend Analysis - The following data pertain to Company A: (in millions) Year 2 Year 1...
Trend Analysis - The following data pertain to Company A: (in millions) Year 2 Year 1 Revenue $39,474 $35,137 Net income 5,658 5,642 Accounts receivable 4,389 3,725 Inventory 2,290 1,926 Total current assets 10,151 9,130 Total assets 34,628 29,930 Total current liabilities 7,753 6,860 Total long-term liabilities 9,641 7,702 Total stockholder equity 20,000 18,000 Common-Size Income Statements - Company A reported the following income statements: COMPANY A INCOME STATEMENT FOR THE YEARS ENDED DECEMBER YEAR 2 AND YEAR 1 (in...
Trend Analysis - The following data pertain to Company B: (in thousands) Year 2 Year 1...
Trend Analysis - The following data pertain to Company B: (in thousands) Year 2 Year 1 Revenue $1,285,876 $1,364,550 Net income 56,644 42,906 Accounts receivable 149,178 168,666 Inventory 158,541 179,688 Total current assets 670,337 649,903 Total asset 859,907 849,399 Total current liabilities 227,807 232,074 Total long-term liabilities 36,483 40,787 Total stockholder equity 595,617 576,538 Common-Size Income Statements - Company B reported the following income statements: COMPANY B INCOME STATEMENT FOR THE YEARS ENDED DECEMBER YEAR 2 AND YEAR 1 (in...
Can you all show me an specialization and production possibilities model and example?
Can you all show me an specialization and production possibilities model and example?
If you had a routine for computing all of the eigenvalues of a nonsymmetric matrix, how...
If you had a routine for computing all of the eigenvalues of a nonsymmetric matrix, how could you use it to compute the roots of any polynomial?
1. Describe a transformation process within an organization that is familiar to you; list all inputs,...
1. Describe a transformation process within an organization that is familiar to you; list all inputs, components, and the transformation process that produces either a product or service the organization delivers its customers. Make sure you mention all of the parts of the transformation process. 2. What is the difference between a “products or goods” versus “services”? What are some of the similarities and differences between the two? Can services be inventoried? (Last Question is Lecture Based) Give some examples...
On planet #3, you fire a projectile horizontally from the edge of a vertical cliff 34.4...
On planet #3, you fire a projectile horizontally from the edge of a vertical cliff 34.4 m above the ground, with an initial speed of 72.6 m/s. The projectile lands 63.5 m away from the base of the cliff. What is the value of g for planet #3? 89.93 m/s^2 44.97 m/s^2 282.83 m/s^2 28.51 m/s^2
Computing Equivalent Units of Production Using the data given for Cases 1–3 below, and assuming the...
Computing Equivalent Units of Production Using the data given for Cases 1–3 below, and assuming the use of the average cost method, compute the separate equivalent units of production—one for materials and one for labor and overhead—under each of the following assumptions (labor and factory overhead are applied evenly during the process in each assumption): Assumptions: All materials go into production at the beginning of the process. All materials go into production at the end of the process. (Note that...
Explain the finite element method for stress analysis as you would to a high school student...
Explain the finite element method for stress analysis as you would to a high school student who is interested in becoming an engineer. Note that this could be the deciding factor for the student to choose Engineering at University. As such keep your answer relevant, interesting and succinct (furthermore, the student is young so they get bored easily...). [Word limit: 200]
3. All of the following can be considered microbes capable of causing human illness except -...
3. All of the following can be considered microbes capable of causing human illness except - protozoa - helminths - algae - fungi -bacteria
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT