0% found this document useful (0 votes)
74 views7 pages

Puting 11 Myths

The document discusses 11 myths surrounding edge computing. It addresses myths such as edge devices not being able to support security or real-time applications, machine learning only being possible in data centers, edge computing not being suitable for low-power applications, and cellular connectivity being required. The document explains how modern edge devices and tools are enabling more processing at the edge to support these types of applications.

Uploaded by

mac9pap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views7 pages

Puting 11 Myths

The document discusses 11 myths surrounding edge computing. It addresses myths such as edge devices not being able to support security or real-time applications, machine learning only being possible in data centers, edge computing not being suitable for low-power applications, and cellular connectivity being required. The document explains how modern edge devices and tools are enabling more processing at the edge to support these types of applications.

Uploaded by

mac9pap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

TECHNOLOGIES EMBEDDED REVOLUTION

11 Myths of Edge Computing


The hardware and software capabilities of embedded IoT devices have grown
significantly in recent years, enabling the emergence of a new generation of powerful
applications.
Robert Oshana
Related To: NXP Semiconductors

What you’ll learn:

Embedded IoT devices can now host intelligence, which was previously in the

domain of the data center

Processing at the edge significantly reduces latencies, enabling real-time

applications

Comprehensive development tools exist to support the developer and reduce time

to market.

Robert Oshana, Vice President of Software Engineering R&D for the Edge Processing

business line at NXP Semiconductors, breaks down the myths surrounding edge

computing.

1. IoT edge devices present a security risk because edge devices are only capable

of hosting basic security measures.

Security is a fundamental requirement of the edge device, and a range of digital

security measures can be implemented to ensure the essential security characteristics

of integrity, confidentiality, authenticity, and non-repudiation. Modern IoT security

solutions are increasingly based on the root-of-trust (RoT) technique, where


cryptographic security algorithms are hosted and protected from physical attack in a

hardened environment.

In some cases, the computational overheads of these security functions are offloaded to

an embedded, dedicated security chip, or trusted platform module (TPM). In others, the

functionality can be hosted in a dedicated core of a multicore MPU.

This combination of hardware and software security subsystems ensures the strongest
possible defense against malicious attacks throughout the lifecycle of the application.

2. Edge processing can’t support real-time applications because of the latencies

inherent in wide-area networks.

Emerging IoT applications, such as autonomous automobiles, industrial robotics, and

remote tele-surgery, require real-time levels of responsiveness. The traditional cloud-

computing model hasn’t been able to support these types of use cases, due to the typical

latencies of the internet and other wide-area networks.

These applications have consequently driven a significant increase in the compute

power embedded in IoT devices and software, which was once in the domain of the

data center and can now be hosted at the edge. This enhanced intelligence enables

more local decision-making, resulting in near real-time levels of responsiveness, thus

empowering a whole new generation of advanced applications.

3. Machine-learning techniques are confined to the data center because their

processing requirements exceed the capabilities of edge computing.

Along with developments in IoT hardware, software advances have been key to the

growth in edge-processing capabilities. As machine-learning (ML) techniques have

matured, tools have emerged that enable ML models to be deployed in the cloud, with

associated inferencing tasks being downloaded to edge devices.

ML software stacks on the edge device benefit from advanced hardware units such as

graphics processing units (GPUs), central processing units (CPUs), digital signal

processors (DSPs), and neural processing unit (NPU) accelerators to perform real-time

ML inferencing tasks locally with occasional cloud connection.


This increased level of intelligence at the edge supports the emergence of more

complex applications that rely on real-time response rates.

4. Edge computing is power-hungry and not suitable for low-power applications.

Power consumption is a critical characteristic of an edge device. Many applications,

such as wearables or remote sensors, must operate for long periods on a single battery

charge, or are powered from alternative energy sources.

Embedded MCUs employ a range of power-optimization techniques, including the use

of low-power silicon materials and the partitioning of functionality according to usage.

A key power-optimization technique is to partition the system-on-chip (SoC)

architecture so that different partitions control specific domains—for example, a real-

time domain, an application domain and a flex domain.

Power-optimization software ensures minimum power use at the system level by only

powering the parts of the SoC that are needed at any given time. Figure 1 illustrates

how this technique is applied to extend the battery life of a device such as a

smartwatch.

1. Dynamic power domain control in a smartwatch application. (Source: Essentials of


Edge Computing by NXP)

5. The internet is going to be swamped by the growing numbers of connected

devices.

The escalating number of connected IoT devices has been a major contributor to the

explosive growth in internet data in recent years, with some analystspredicting that 74

zettabytes of data would be created globally in 2021 (1 zettabyte is equivalent to one

trillion gigabytes).

As the compute power embedded in edge devices continues to ramp up, more data

processing is taking place at the edge rather than in the cloud. This local data

processing will significantly reduce the amount of data that must be processed in the

cloud. The linear relationship between the number of IoT devices and internet traffic
will be fundamentally altered, proportionately reducing the amount of data

transmitted over the internet.

6. IoT edge devices totally depend on cellular connectivity to be useful.

Wireless network connectivity is a fundamental enabler of the widely diverse range of

IoT use cases in areas such as wearables, home automation, smart buildings, industrial

automation, medical devices and many more. Individual IoT applications vary widely

in their connectivity requirements; domestic smart lighting systems depend on mesh

networking technologies, remote sensors in agricultural applications require low

power networking, factory automation applications depend on real-time

responsiveness and connected automobiles need wide-area coverage.

Four main wireless protocols are currently prominent within IoT applications (Fig. 2).

Wi-Fi 6 offers high speed, low latency connectivity in indoor spaces and Zigbee, Thread
and Bluetooth Low Energy (BLE) are popular in smart building and homes, for

example, where low-power mesh networking is required. Ultra-wideband (UWB)

enables accurate positioning for tracking applications and near-field communication

(NFC) delivers secure data exchange and access.

2. Four wireless protocols are commonly used in IoT applications (Source: Essentials of

Edge Computing by NXP)

The enhanced cellular-networking capabilities of 5G is driving its acceptance via a wide

spectrum of applications across multiple sectors, supporting both indoor and outdoor

connectivity.

Developers can therefore choose from one or multiple established wireless

communication standards to ensure secure interoperability of their devices, depending

on the specific needs of the application.

7. Connecting an IoT application to the cloud is complex and requires highly

skilled network engineering resources and management of multiple parties (WAN

provider and cloud service provider) to make it work.


At the same time, cloud connectivity is rapidly becoming a default requirement for an

IoT application, bringing benefits such as remote diagnostics, OTA upgrades, remote

device management, and enhanced compute capability at the edge.

For the designer faced with ever-shrinking development cycles, however, harnessing

the additional flexibilities of multi-protocol devices while grappling with the

complexities of cloud connectivity threatens to add both cost and time to already

stretched projects.

Fortunately, in parallel with these hardware and software developments, a growing


range of toolsets are available to ease the development task. Matter, for example, is a

unifying, IP-based connectivity protocol that simplifies development of multi-protocol

systems. An open-source standard, Matter enables developers to connect and build

dependable, secure IoT ecosystems and increase compatibility among smart-home

devices.

In addition, many cloud providers, including Amazon Web Services (AWS), Microsoft

Azure, and Google Cloud, are providing IoT software development kits (SDKs) that

make it easier to connect to the cloud from an IoT device.

8. Edge devices deployed in the field will quickly be rendered obsolete by future

generations of wireless protocols.

The various wireless communications protocols in use within the IoT are governed by

established standards bodies such as the IEEE and 3GPP. These organizations manage

the evolution of the respective standards to ensure backwards compatibility across

versions.

Furthermore, with increasing proportions of the functionality being implemented in

software stacks, upgrades between versions can be accomplished by over-the-air (OTA)

downloads. Developers also are increasingly able to take advantage of multimode

devices that increase the flexibility and choice of communication protocol.

9. Users will lose the ability to intervene in a process that’s being run by an edge

device.
Many edge-device SoCs integrate powerful graphics processors that enable data to be

securely presented on the edge device itself, rather than via the cloud. In addition, the

powerful local processing capability of the device can be used to interpret and present

the data in a variety of user-friendly, visual arrangements, such as charts or maps.

Examples of this capability can be seen across all use cases. Information panels on the

factory floor enable operators to monitor process efficiency and product quality, and

subsequently take appropriate action.

The cockpit of the modern, connected car contains digital dashboards that provide the

driver with information such as car status and navigation and route information. In
the medical sector, doctors and lab technicians constantly refer to the screens of digital

assistants driven by AI, real-time data, and historical data. At the consumer level,
wearables, appliances, and IoT devices all gather data that’s processed and presented to

the user on screens.

The powerful combination of local processing and advanced graphics capability

enables a customizable, high level of interaction between user and edge device.

10. Developing an edge application is complex and time-consuming, and it


requires an abundance of highly skilled, expensive resources.

Developing edge-computing devices is certainly challenging because of the increased


hardware complexity, the need for more features in the firmware, and the changes in

the development flow to reach higher productivity.

A multitude of toolsets are available on the market, though, which help the developer
overcome the barriers to achieving high quality and efficiency during the development

process. These tools facilitate fast builds and automated builds, and they support
testing and delivery with both static- and dynamic-analysis capability.

The complexity of the project will dictate the exact tools required. However, a typical
set for a basic software project (Fig. 3) would include a visual editor, a GNU Compiler

Collection (GCC) and associated build tools such as GNU Debugger (GDB) for debugging
and finalizing the binary, and Secure Copy Protocol (SCP) for copying the file to a

networked end device.


3. A typical toolset for a software project would include support for the Edit, Build, Debug,
and Deploy phases. (Source: Essentials of Edge Computingby NXP)

Choosing the right process paired with the right tools will ensure the consistent
development of high-quality applications within budget and time constraints.

11. Development cycles for edge-computing applications are lengthy,

compromising time to market.

Rapid time to market is essential in today’s fast-paced IoT market and all players in the

ecosystem are supporting their products with tools that aimed to compress timescales
and budgets. SoC manufacturers provide development kits and modules to enable

rapid prototyping and evaluation, operating-system variants such as embedded Linux


ease real-time development, and cloud providers offer tools such as AWS and Azure to

support rapid cloud connectivity.

As the spectrum of IoT applications expands, these tools enable the developer to focus
on the specifics of the application, abstracting the technical details of functionalities

such as security and connectivity to packaged solutions that can be easily integrated
into the final product.

Source URL: https://www.electronicdesign.com/technologies/embedded-


revolution/article/21243610/nxp-semiconductors-11-myths-of-edge-computing

You might also like