Blog Posts Business Management

Edge Computing: Part II – Cost & security, Standards, Technical

Blog: NASSCOM Official Blog

This is the second part of a two-part blog on the questions raised during an Edge Computing Webinar that NASSCOM hosted on Apr 16, 2020. Since many questions from the attendees were unanswered, the panellist have made an effort to address these offline.

This post covers the questions on Cost & security, Standards, Technical aspects of edge.

Part I of the post can be accessed here: Use cases, Start-ups, Go-To-Market

 

COST & SECURITY

  1. “In comparison with Cloud, Edge computing is expensive in terms of hardware & infra management” – what is your point of view?

The edge computing is expensive in terms of hardware and infra, but you need to look at it holistically. You must consider the cost associated with the network traffic, if you are to process all the gathered data in the cloud and the ROI that new business opportunities edge will bring in. Realistically, edge computing cost do vary wildly, depending on the size and scale of your deployment, the amount of data being collected and processed, and the geographic location of your edge computing deployment. If you plan your business case and edge deployment optimally for the business case in hand, edge will not turn out to be expensive.

 

  1. How do we work on OT security? That’s the most vulnerable area when we talk of edge computing?

Today Industrial systems are getting connected due to the IT-OT convergence brought about by Edge computing. This creates security risks that need to be addressed. IT and OT security can be managed through monitoring of networking traffic and establishing security policies. Traffic from OT equipment is between determined end points, so it’s easier to baseline and monitor and protect them in case of attacks. There are IOT & OT cybersecurity tools in the market like Nozomi Networks, Forescout, Splunk, etc. which can be evaluated. OT security needs to be planned similar to IT security, with access controls, segmentation, cryptographic controls, governance and incident response plan.

 

  1. Should edge solution always involve gateway hardware for security of OTs?

Having an Edge gateway would limit the network connection points from an OT equipment to edge gateway, as OT equipment would not need to be connected to the internet or cloud. However, purpose of edge gateway hardware is not to enforce OT security, but more to gather data and convert data to the required format and perform analytics. OT security involves many factors like physical security, access control, security policies, hardening, DMZs, perimeter firewalls, identity management, app whitelisting, device firewalls, breach detection, etc.

 

STANDARDS

  1. Do you see edge computing as a homogeneous environment or is it like Azure and AWS3 needing to work together?

Like cloud, edge platforms also will emerge to be heterogeneous. The distributed federated aspect of edge computing will need different interfaces for device to edge and edge to cloud interactions. This will demand the edge be heterogeneous and interoperable.

 

  1. How does the ETSI MEC specification fit in? (Wrt consortiums).

Industry Specification Group (ISG) on ETSI – Multi-Access Edge Computing (MEC) Group’s purpose is to create a standardized, open environment which will allow efficient and seamless integration of applications from vendors, service providers and third-parties across multi-vendor Multi-access Edge Computing platforms.

The work of the MEC initiative aims to unite the telco and IT-cloud worlds, providing IT and cloud-computing capabilities within the RAN (Radio Access Network). The MEC ISG specifies the elements that are required to enable applications to be hosted in a multi-vendor multi-access edge computing environment.

In addition, ETSI MEC ISG provides API specifications, definitions and services for the application developers to use NW related services in their applications. One such example is Location (NW services) provided through ETSI MEC API to be consumed in Applications.

List of MEC participants: https://portal.etsi.org/TB-SiteMap/MEC/List-of-Members

 

TECHNICAL

  1. What are the testing requirements for edge devices/networks and what kind of test equipment/tools will help in this area?

The testing requirements are:

 

  1. Will there be any contribution of Raspberry Pi in industrial edge computing?

While there are several ruggedized versions of Arduino and Raspberry available in the market, they are not yet widely considered by customers for Industrial IoT implementations. (https://www.rs-online.com/designspark/raspberry-pi-and-arduino-in-industrial-environments)

However, they are not designed to be as robust as what industrial solutions demand. OT equipment would be heavy and operate in harsh conditions (heat, humidity, dust, power spikes) and cannot tolerate failures. Case studies using Raspberry Pi in real world implementations would be very rare. Edge servers by HP, Dell, Eurotech, Advantech and others are what is currently being considered for Industrial IoT.

 

  1. Today is there any solution in the market that deals with downloading the model at the edge and do the inference at the edge?

There are several solutions in the market that help in deploying Machine Learning models at edge and do inference there. TensorFlow Lite is an open source deep learning framework for edge inference. There are optimized Edge friendly inference platforms provided by chip vendors like Intel, NVIDIA and ARM. For example, the OpenVINO Toolkit from Intel, TensorRT from NVIDIA, TensorFlow Lite from Google, Qualcomm Neural Processing SDK and ONNX Runtime simplify and speedup the inference at the Edge.

 

  1. Do you see Hyperledger Fabric as a platform for decentralized edge management and monetization control?

 

Contributors:

Disclaimer: Views and opinions expressed here are personal and do not reflect the official view of the respective companies

NASSCOM whitepaper: Edge Computing-Towards A More Distributed Future” (Dec-2019)

I hope you are finding my blogs in the Edge Computing series interesting. Please do share your comments and areas of interests with me at: diksha@nasscom.in

The post Edge Computing: Part II – Cost & security, Standards, Technical appeared first on NASSCOM Community |The Official Community of Indian IT Industry.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/edge-computing-part-ii-cost-security-standards-technical/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×