Module 4 Flashcards
definition/concept of edge computing
- decentralization of networks
- concept of edge computing is that instead of getting the data close to the data center, the data center is brought close to the source
cloud layer
- cloud layer and edge layer complement each other
- edge servers pass on data to the cloud layer for complex processing
- edge servers will also pass a part of the data for storage and comprehensive analysis
edge layer
- layer mainly consists of edge servers larger in quantity and vastly deployed
- edge layer considered to be core
- data which cannot be processed in the edge layer is sent to and analyzed in the cloud layer
device layer
- amongst the three layers it contains the most number of devices
- through sensors, devices in the device layer collect and capture data used to help products achieve the purposes they are designed for
- edge and cloud possess better computing skills but device layer can also do small levels of processing
Security risks and its measures
(edge computing-explain points also)
- Data breach
- Frequent Updates
- Scalability
- Cloud adoption risk
- Edge and IoT security risks
How to secure edge computing ?
(explain points also)
- Keep your devices and your data safe
- Secure your network connection
- Implement security measures at the edge level
- Protect against IoT security risks
- Monitor and log all edge activities
Advantages of edge computing
- Faster response time
- Security and compliance
- Cost-Effective Solution
- Reliable Operation with intermittent connectivity
- Reduced latency
Limitations of edge computing
- Complexity
- Limited Resources
3.. Dependence on connectivity - Security concern
Challenges in edge computing
- Privacy and security of data
- Scalability
- Reliability
- Speed
- Efficiency
Fog computing
-> it is a distributed computing paradigm that extends the cloud services to the edge of the network
-> It facilitates management and programming of compute, networking and storage services between data services and end devices
edge devices
->devices which are at the edge of the network or a bridge between two networks which works by being near the source of the data it manages.
->main function includes transmission, routing, processing, filtering, translation and storage of data between two networks.
eg: sensors, actuators and iot gateways
architecture of fog computing
(remember the functions of each layer)
- Sensors, Edge Devices, Gateways and apps
- Network
- Cloud Services
- Resource management
- Application
(wrt fog computing)
Security risk 1:
Increased attack surface due to distributed nature of the technology
-> Securing the individual devices and systems that make up the fog network, as well as the connections bw them
-> to use encryption and authentication protocols so that only authorized people can access and data transmitted can be saved from eavesdropping and tampering
(wrt fog computing)
Security risk 2:
Privacy, as the technology often involves collection and processing personal data
-> Organizations need to be transparent about their data collection practices and allow users to opt out if needed
(wrt fog computing)
Security risk 3:
Fog computing introduces new challenges in terms of compliance with data protection regulations such as General Protection Regulation(GDPR) in the union
-> should work closely with legal and compliance experts
-> this may include implementing data protection by design principles, conducting regular risk assessments and maintaining detailed record of data processing activities.
Advantages of fog computing
(explain points also)
1.Reduction of network traffic
2. Suitable for iot tasks and queries
3. low-latency requirements
4.Scalability
limitations of fog computing
(explain points also)
- Bandwidth
2.latency
3.congestion
Application of fog computing
(explain points also)
1.Healthcare
2.Augmented reality
difference between edge computing and fog computing
remember the points
edge routers (edge device)
manages data traffic to an IP address so multiple devices can operate using a single internet connection
WAN devices
devices extend over a large area even global
routing switches
can perform the same functions as router but also allow connections across different devices
firewalls
firewalls monitor all network traffic for security
multiplexers
merge data from multiple data sources over a single signal