𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Edge Computing Patterns for Solution Architects

✍ Scribed by Ashok Iyengar and Joseph Pearson


Publisher
Packt Publishing Pvt ltd
Year
2024
Tongue
English
Leaves
214
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Master edge computing architectures, unlock industry-specific patterns, apply proven best practices, and progress from basics to end-to-end solutions
Key Features

Unlock scalable edge solutions by mastering proven archetypes for real-world success
Learn industry-specific patterns, tailoring solutions for diverse sector needs
Make strategic decisions between cloud-out and edge-in strategies with confidence
Purchase of the print or Kindle book includes a free PDF eBook

Book Description

Enriched with insights from a hyperscaler's perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches.

This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you'll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You'll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing.

By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.
What you will learn

Distinguish edge concepts, recognizing that definitions vary among different audiences
Explore industry-specific architecture patterns that shape custom solutions
Analyze three proven edge computing archetypes for real-world scalability
Apply best practices judiciously, adapting patterns to meet specific requirements
Evaluate data for storage or discarding based on compliance and industry norms
Advance from the foundational basics to complex end-to-end edge configurations
Gain practical insights for achieving low-latency, high-bandwidth edge solutions

Who this book is for

Ideal for VPs of IT infrastructure, enterprise architects, solution architects, and SRE professionals with a background in cloud computing, this book is for individuals involved in crafting edge reference architectures and tailored solutions across diverse industries. It provides valuable insights and practical patterns drawn from real-world implementations in sectors such as retail, telecommunications, and manufacturing. Foundational knowledge of cloud computing is assumed to align with the advanced nature of the content covered.

✦ Table of Contents


Edge Computing Patterns for Solution Architects
Contributors
About the authors
About the reviewer
Preface
Who this book is for
What this book covers
Images used in the book
Conventions used
Get in touch
Share Your Thoughts
Download a free PDF copy of this book
Part 1:Overview of Edge Computing as a Problem Space
Chapter 1: Our View of Edge Computing
Suggested pre-reading material
Speaking like an edge native
What is the edge?
Are the edge and the cloud extremes of the same thing?
How does edge computing bring value, and why now?
Which edge? Categorizing edges
The user edge – field-deployed compute
The SP edge – regional compute
Your computer or mine? Tactics for service deployment
Edge computing doesn’t require dedicated resources
Single device, running multiple applications simultaneously
Single device, alternating applications by schedule or purpose
Hosted edge infrastructure – applications on shared compute
Cloud-out versus edge-in
Looking deeper at cloud-out architectures
Delving into edge-in architectures
Introducing archetype patterns
What is an archetype?
The days of software creation
Deploying archetype patterns
Summary
Chapter 2: Edge Architectural Components
Edge components
Functional requirements
Sensing
Inferencing
Analytics
Data
Non-functional requirements
Security
Service management and operations
Edge use cases and patterns
Edge device specifications and protocols
Architectural decisions
Grouping edge ADs
Cloud
Network
Server/cluster
Device
Summary
Part 2: Solution Architecture Archetypes in Context
Chapter 3: Core Edge Architecture
Suggested pre-reading material
What is legacy IoT architecture?
A bit of history
Purpose and promise
Fundamental drawbacks
Device configuration
Rationale
Architectural element categories
Edge devices versus edge hub
Reviewing the pattern
Self-propelled inspection robot example
Containers
Disconnected operations
Summary
Chapter 4: Network Edge Architecture
Definitions
NFV
NFV considerations
SDN
VNF, NFV, SDN, and edge computing
Underlay and overlay networks
Network traffic management
MEC
Network edge architecture
RAN
CSPs and hyperscalers
Sample architectures
Manufacturing scenario
Healthcare scenario
Campus network scenario
Summary
Chapter 5: End-to-End Edge Architecture
IT and OT convergence
AI and edge computing
Industrial edge scenario
Manufacturing scenario
Retail edge scenario
Retail store scenario
Network slicing
Example scenario
Edge reference architecture
The cloud
The network
The edge
Edge and distributed cloud computing
Distributed cloud computing
The scenario
Summary
Part 3: Related Considerations and Concluding Thoughts
Chapter 6: Data Has Weight and Inertia
Suggested pre-reading material
Data encryption
Motivations for encrypting data
Protecting data without making it difficult to use
Ensuring that data modifications are noticeable
Data storage and management
Strategies for defining and enforcing data policies
Usage options ranging from real to synthetic data
Rules of thumb for retaining data, or not
Using data to build machine learning (ML) models
The promise of foundation models
How small and efficient can we make models?
Customizing existing models for each deployment
Using general-purpose platforms rather than single-purpose applications
Connectivity and the data plane
Optimizing data availability without connectivity
Aggregating data versus keeping it distributed
Migrating data files automatically
Summary
Chapter 7: Automate to Achieve Scale
Automating service delivery
DevOps
Infrastructure as code
Extending automation to the edge
Developing edge applications
Scalability with automation
Prepping an edge device
Prepping an edge cluster
Operational security
Limiting physical access
Limiting connectivity
Trusted hardware and provisioning
Trusted data
Trusted compute
Tactical Edge
Automation with AI
LLMs and generative AI
Using AI in automation
Summary
Chapter 8: Monitoring and Observability
Monitoring and observability
How monitoring works
How observability works
How network observability works
Measuring to improve
Network observability example
What to measure
Real user monitoring
Network performance management
Anomaly detection
Capacity
Business outcomes
Improving edge solution
Monitoring challenges at the edge
Configuration changes at the edge
Edge application monitoring
Personas
Summary
Chapter 9: Connect Judiciously but Thoughtlessly
Suggested pre-reading material
Declarative versus imperative configuration
Comparing the two approaches
What slows down application deployment on the edge?
Solutioning edge-connected networks and applications
Zero Trust or as close as you can get
Managing secrets on the edge
Zero Trust architectures in edge computing
Secure access service edge
Overlay, underlay, and shared responsibilities
The network underlay
The network overlay
Zero Trust Network Access
End-to-end encryption
Application-centric networking
Summary
Chapter 10: Open Source Software Can Benefit You
Suggested pre-reading material
Open source and edge computing
Edge computing and OSS are intertwined
Do you really need to create that component?
Creating and supporting an open source program office (OSPO)
A software bill of materials is your friend
Using SBOMs to track software dependencies
The characteristics of a mature OSS project
How to nurture and assist projects you rely on
Responses to projects that stray from their mission
Common objections
Recommendations for contributing code
Let the cat out of the bag (Successfully open source your code and documentation)
Five options for open sourcing
What to open source
Summary
Chapter 11: Recommendations and Best Practices
Suggested pre-reading material
Edge-native best practices as an outgrowth of cloud native
Pulling can be more secure than pushing
Application dependency resolution approaches
Deployment models for distributed edge applications compared
Making antifragile applications
Defining the terms
What are your current areas of weakness or vulnerability?
Properties of antifragile architectures
An ounce of prevention...
When things go wrong
What to avoid
Anti-patterns
How to recover, gracefully or not
Summary
Index
Why subscribe?
Other Books You May Enjoy
Packt is searching for authors like you
Share Your Thoughts
Download a free PDF copy of this book


πŸ“œ SIMILAR VOLUMES


Edge Computing Patterns for Solution Arc
✍ Ashok Iyengar and Joseph Pearson πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing Pvt ltd 🌐 English

Enriched with insights from a hyperscaler’s perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches

Internet of Things for Architects: Archi
✍ Perry Lea πŸ“‚ Library πŸ“… 2018 πŸ› Packt Publishing 🌐 English

Learn to design, implement and secure your IoT infrastructure Key Features β€’ Build a complete IoT system that is the best fit for your organization β€’ Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack β€’ Understand the theory, concepts, and implementation

Solutions for Computer System Architectu
✍ Mano M.M. πŸ“‚ Library πŸ“… 1992 πŸ› PH 🌐 English

Dealing with computer architecture as well as computer organization and design, this fully updated book provides the basic knowledge necessary to understand the hardware operation of digital computers. Written to aid electrical engineers, computer engineers, and computer scientists, the volume i

Programming with TensorFlow: Solution fo
✍ Kolla Bhanu Prakash (editor), G. R. Kanagachidambaresan (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p></p><p>This practical book provides an end-to-end guide to TensorFlow, the leading open source software library that helps you build and train neural networks for deep learning, Natural Language Processing (NLP), speech recognition, and general predictive analytics. The book provides a hands-on a

Enterprise Architecture Patterns: Practi
✍ Thierry Perroud, Reto Inversini (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>Every enterprise architect faces similar problems when designing and governing the enterprise architecture of a medium to large enterprise. Design patterns are a well-established concept in software engineering, used to define universally applicable solution schemes. By applying this approach