The Emergence of Edge Computing Technology over Cloud Computing

Author(s):  
Dr. Khalaf Khatatneh ◽  
Osama Nawafleh ◽  
Dr.Ghassan Al-Utaibi
2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Zhenzhong Zhang ◽  
Wei Sun ◽  
Yanliang Yu

With the vigorous development of the Internet of Things, the Internet, cloud computing, and mobile terminals, edge computing has emerged as a new type of Internet of Things technology, which is one of the important components of the Industrial Internet of Things. In the face of large-scale data processing and calculations, traditional cloud computing is facing tremendous pressure, and the demand for new low-latency computing technologies is imminent. As a supplementary expansion of cloud computing technology, mobile edge computing will sink the computing power from the previous cloud to a network edge node. Through the mutual cooperation between computing nodes, the number of nodes that can be calculated is more, the types are more comprehensive, and the computing range is even greater. Broadly, it makes up for the shortcomings of cloud computing technology. Although edge computing technology has many advantages and has certain research and application results, how to allocate a large number of computing tasks and computing resources to computing nodes and how to schedule computing tasks at edge nodes are still challenges for edge computing. In view of the problems encountered by edge computing technology in resource allocation and task scheduling, this paper designs a dynamic task scheduling strategy for edge computing with delay-aware characteristics, which realizes the reasonable utilization of computing resources and is required for edge computing systems. This paper proposes a resource allocation scheme combined with the simulated annealing algorithm, which minimizes the overall performance loss of the system while keeping the system low delay. Finally, it is verified through experiments that the task scheduling and resource allocation methods proposed in this paper can significantly reduce the response delay of the application.


The inventions in the field of Cloud computing with mobile devices, cloudlets, Edge computing are sizzling growth of IoT(Internet of Things) devices. The cloud computing technology has its limitation in various attributes such as bandwidth, latency, location awareness, resource constraints etc. In order to overcome these issues, the edge computing, which is known as manipulating the data at the edge of the network. In order to support various integrated features with IoT such as storage, networking, home energy management, augment reality fog computing provides resource access to the network edge of the user. In the user side it is confronted with serious security issues for data security. This article provides the augmentation and orchestration of security issues in fog computing. In this paper, first we check the architecture of fog computing. Then we suggest broad taxonomy of fog architecture with various architectures. Finally, this paper is concluded with scope and future research in fog computing


Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


2021 ◽  
Vol 1802 (3) ◽  
pp. 032031
Author(s):  
Guoyu Cui ◽  
Wei Ye ◽  
Zhanbin Hou ◽  
Tong Li ◽  
Ruolin Liu

2020 ◽  
Vol 2 (1) ◽  
pp. 92
Author(s):  
Rahim Rahmani ◽  
Ramin Firouzi ◽  
Sachiko Lim ◽  
Mahbub Alam

The major challenges of operating data-intensive of Distributed Ledger Technology (DLT) are (1) to reach consensus on the main chain as a set of validators cast public votes to decide on which blocks to finalize and (2) scalability on how to increase the number of chains which will be running in parallel. In this paper, we introduce a new proximal algorithm that scales DLT in a large-scale Internet of Things (IoT) devices network. We discuss how the algorithm benefits the integrating DLT in IoT by using edge computing technology, taking the scalability and heterogeneous capability of IoT devices into consideration. IoT devices are clustered dynamically into groups based on proximity context information. A cluster head is used to bridge the IoT devices with the DLT network where a smart contract is deployed. In this way, the security of the IoT is improved and the scalability and latency are solved. We elaborate on our mechanism and discuss issues that should be considered and implemented when using the proposed algorithm, we even show how it behaves with varying parameters like latency or when clustering.


Sign in / Sign up

Export Citation Format

Share Document