K

Kathleen Martin

Guest
Edge computing is a critical component of today’s IT infrastructure network design. However, there are a few fundamental obstacles to overcome before we can move data processing to the network’s edge. Thankfully, firms all across the world are working to solve these issues and make edge computing more efficient, reliable, and user-friendly. If we look at the kind of patents that firms are submitting, we can readily figure out how they are solving these problems in novel ways. Patents provide us with a window into the inner workings of a corporation, allowing us to observe what R&D is going on. As a result, we identified five main obstacles and one inventive solution for each.
1) Security And Encryption
The internet of things (IoT) is well-known for its security flaws. Because of the enormous volume of data exchanged between the data centre and the edge, each device in an edge server is another potentially susceptible endpoint. However, the Zhejiang Geely Group, a Chinese multinational corporation, is attempting to make the network more secure with their invention.
A blockchain-based edge computing security encryption technique is the subject of their patent. A vehicle (edge data centre) authenticates a request utilising a multi-level verification system based on blockchain and creates action in the steering edge node using this technology.
2) Distributed Computing
Most servers have a scattered collection of modules that are positioned far apart from one another. On the other hand, Edge computing tends to move all systems closer to the processing regions. This causes a problem since the business server must take the edge server into account during calculation.
So, how is the industry dealing with this problem?
Beijing Zhixin Microelectronics Technology, a subsidiary of the State Grid Information and Communication Industry Group, has submitted a patent that proposes breaking down the whole edge server into several routes with route arranging devices at the edge centre. When a connection request is received, a suitable route is sought (by matching source and destination node criteria), and if none is identified, a new route is constructed based on the service and bandwidth needs.
Continue reading: https://www.financialexpress.com/lifestyle/science/how-is-edge-computing-transforming-the-world-through-the-extravagant-technology/2495144/
 

Attachments

  • p0007665.m07311.computing.jpeg
    p0007665.m07311.computing.jpeg
    26.2 KB · Views: 47
  • Like
Reactions: Kathleen Martin