Details

Understanding Infrastructure Edge Computing


Understanding Infrastructure Edge Computing

Concepts, Technologies, and Considerations
1. Aufl.

von: Alex Marcham

114,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 21.04.2021
ISBN/EAN: 9781119763253
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>UNDERSTANDING INFRASTRUCTURE EDGE COMPUTING</b> <p><b>A comprehensive review of the key emerging technologies that will directly impact areas of computer technology over the next five years</b><p>Infrastructure edge computing is the model of data center and network infrastructure deployment which distributes a large number of physically small data centers around an area to deliver better performance and to enable new economical applications. It is vital for those operating at business or technical levels to be positioned to capitalize on the changes that will occur as a result of infrastructure edge computing.<p>This book provides a thorough understanding of the growth of internet infrastructure from its inception to the emergence of infrastructure edge computing. Author Alex Marcham, an acknowledged leader in the field who coined the term ‘infrastructure edge computing,’ presents an accessible, accurate, and expansive view of the next generation of internet infrastructure. The book features illustrative examples of 5G mobile cellular networks, city-scale AI systems, self-driving cars, drones, industrial robots, and more—technologies that increase efficiency, save time and money, and improve safety. Covering state-of-the-art topics, this timely and authoritative book:<ul><li>Presents a clear and accurate survey of the key emerging technologies that will impact data centers, 5G networks, artificial intelligence and cyber-physical systems, and other areas of computer technology</li><li>Explores how and why Internet infrastructure has evolved to where it stands today and where it needs to be in the near future</li><li>Covers a wide range of topics including distributed application workload operation, infrastructure and application security, and related technologies such as multi-access edge computing (MEC) and fog computing</li><li>Provides numerous use cases and examples of real-world applications which depend upon underlying edge infrastructure</li></ul><p>Written for Information Technology practitioners, computer technology practitioners, and students, <i>Understanding Infrastructure Edge Computing</i> is essential reading for those looking to benefit from the coming changes in computer technology.
<p>Preface xv</p> <p>About the Author xvii</p> <p>Acknowledgements xix</p> <p><b>1 Introduction 1</b></p> <p><b>2 What Is Edge Computing? 3</b></p> <p>2.1 Overview 3</p> <p>2.2 Defining the Terminology 3</p> <p>2.3 Where Is the Edge? 4</p> <p>2.3.1 A Tale of Many Edges 5</p> <p>2.3.2 Infrastructure Edge 6</p> <p>2.3.3 Device Edge 6</p> <p>2.4 A Brief History 8</p> <p>2.4.1 Third Act of the Internet 8</p> <p>2.4.2 Network Regionalisation 10</p> <p>2.4.3 CDNs and Early Examples 10</p> <p>2.5 Why Edge Computing? 12</p> <p>2.5.1 Latency 12</p> <p>2.5.2 Data Gravity 13</p> <p>2.5.3 Data Velocity 13</p> <p>2.5.4 Transport Cost 14</p> <p>2.5.5 Locality 14</p> <p>2.6 Basic Edge Computing Operation 15</p> <p>2.7 Summary 18</p> <p>References 18</p> <p><b>3 Introduction to Network Technology 21</b></p> <p>3.1 Overview 21</p> <p>3.2 Structure of the Internet 21</p> <p>3.2.1 1970s 22</p> <p>3.2.2 1990s 22</p> <p>3.2.3 2010s 23</p> <p>3.2.4 2020s 23</p> <p>3.2.5 Change over Time 23</p> <p>3.3 The OSI Model 24</p> <p>3.3.1 Layer 1 25</p> <p>3.3.2 Layer 2 25</p> <p>3.3.3 Layer 3 26</p> <p>3.3.4 Layer 4 26</p> <p>3.3.5 Layers 5, 6, and 7 27</p> <p>3.4 Ethernet 28</p> <p>3.5 IPv4 and IPv6 29</p> <p>3.6 Routing and Switching 29</p> <p>3.6.1 Routing 30</p> <p>3.6.2 Routing Protocols 31</p> <p>3.6.3 Routing Process 34</p> <p>3.7 LAN, MAN, and WAN 41</p> <p>3.8 Interconnection and Exchange 42</p> <p>3.9 Fronthaul, Backhaul, and Midhaul 44</p> <p>3.10 Last Mile or Access Networks 45</p> <p>3.11 Network Transport and Transit 46</p> <p>3.12 Serve Transit Fail (STF) Metric 48</p> <p>3.13 Summary 51</p> <p>References 52</p> <p><b>4 Introduction to Data Centre Technology 53</b></p> <p>4.1 Overview 53</p> <p>4.2 Physical Size and Design 53</p> <p>4.3 Cooling and Power Efficiency 54</p> <p>4.4 Airflow Design 56</p> <p>4.5 Power Distribution 57</p> <p>4.6 Redundancy and Resiliency 58</p> <p>4.7 Environmental Control 61</p> <p>4.8 Data Centre Network Design 61</p> <p>4.9 Information Technology (IT) Equipment Capacity 65</p> <p>4.10 Data Centre Operation 66</p> <p>4.10.1 Notification 67</p> <p>4.10.2 Security 67</p> <p>4.10.3 Equipment Deployment 67</p> <p>4.10.4 Service Offerings 68</p> <p>4.10.5 Managed Colocation 68</p> <p>4.11 Data Centre Deployment 69</p> <p>4.11.1 Deployment Costing 69</p> <p>4.11.2 Brownfield and Greenfield Sites 69</p> <p>4.11.3 Other Factors 70</p> <p>4.12 Summary 70</p> <p>References 70</p> <p><b>5 Infrastructure Edge Computing Networks 71</b></p> <p>5.1 Overview 71</p> <p>5.2 Network Connectivity and Coverage Area 71</p> <p>5.3 Network Topology 72</p> <p>5.3.1 Full Mesh 74</p> <p>5.3.2 Partial Mesh 74</p> <p>5.3.3 Hub and Spoke 75</p> <p>5.3.4 Ring 76</p> <p>5.3.5 Tree 76</p> <p>5.3.6 Optimal Topology 76</p> <p>5.3.7 Inter-area Connectivity 77</p> <p>5.4 Transmission Medium 78</p> <p>5.4.1 Fibre 78</p> <p>5.4.2 Copper 78</p> <p>5.4.3 Wireless 79</p> <p>5.5 Scaling and Tiered Network Architecture 80</p> <p>5.6 Other Considerations 81</p> <p>5.7 Summary 82</p> <p><b>6 Infrastructure Edge Data Centres 83</b></p> <p>6.1 Overview 83</p> <p>6.2 Physical Size and Design 83</p> <p>6.2.1 Defining an Infrastructure Edge Data Centre 84</p> <p>6.2.2 Size Categories 84</p> <p>6.3 Heating and Cooling 102</p> <p>6.4 Airflow Design 105</p> <p>6.4.1 Traditional Designs 107</p> <p>6.4.2 Non-traditional Designs 109</p> <p>6.5 Power Distribution 113</p> <p>6.6 Redundancy and Resiliency 114</p> <p>6.6.1 Electrical Power Delivery and Generation 116</p> <p>6.6.2 Network Connectivity 118</p> <p>6.6.3 Cooling Systems 120</p> <p>6.6.4 Market Design 122</p> <p>6.6.5 Redundancy Certification 124</p> <p>6.6.6 Software Service Resiliency 125</p> <p>6.6.7 Physical Redundancy 126</p> <p>6.6.8 System Resiliency Example 127</p> <p>6.7 Environmental Control 128</p> <p>6.8 Data Centre Network Design 131</p> <p>6.9 Information Technology (IT) Equipment Capacity 134</p> <p>6.9.1 Operational Headroom 135</p> <p>6.10 Data Centre Operation 135</p> <p>6.10.1 Site Automation 136</p> <p>6.10.2 Single or Multi-tenant 142</p> <p>6.10.3 Neutral Host 144</p> <p>6.10.4 Network Operations Centre (NOC) 145</p> <p>6.11 Brownfield and Greenfield Sites 147</p> <p>6.12 Summary 151</p> <p><b>7 Interconnection and Edge Exchange 153</b></p> <p>7.1 Overview 153</p> <p>7.2 Access or Last Mile Network Interconnection 153</p> <p>7.3 Backhaul and Midhaul Network Interconnection 158</p> <p>7.4 Internet Exchange 160</p> <p>7.5 Edge Exchange 164</p> <p>7.6 Interconnection Network Technology 167</p> <p>7.6.1 5G Networks 168</p> <p>7.6.2 4G Networks 169</p> <p>7.6.3 Cable Networks 170</p> <p>7.6.4 Fibre Networks 172</p> <p>7.6.5 Other Networks 173</p> <p>7.6.6 Meet Me Room (MMR) 173</p> <p>7.6.7 Cross Connection 174</p> <p>7.6.8 Virtual Cross Connection 176</p> <p>7.6.9 Interconnection as a Resource 179</p> <p>7.7 Peering 180</p> <p>7.8 Cloud On-ramps 181</p> <p>7.9 Beneficial Impact 183</p> <p>7.9.1 Latency 183</p> <p>7.9.2 Data Transport Cost 184</p> <p>7.9.3 Platform Benefit 185</p> <p>7.10 Alternatives to Interconnection 186</p> <p>7.11 Business Arrangements 187</p> <p>7.12 Summary 188</p> <p><b>8 Infrastructure Edge Computing Deployment 189</b></p> <p>8.1 Overview 189</p> <p>8.2 Physical Facilities 189</p> <p>8.3 Site Locations 191</p> <p>8.3.1 kW per kM2 192</p> <p>8.3.2 Customer Facility Selection 193</p> <p>8.3.3 Site Characteristics 194</p> <p>8.4 Coverage Areas 195</p> <p>8.5 Points of Interest 197</p> <p>8.6 Codes and Regulations 198</p> <p>8.7 Summary 200</p> <p><b>9 Computing Systems at the Infrastructure Edge 203</b></p> <p>9.1 Overview 203</p> <p>9.2 What Is Suitable? 203</p> <p>9.3 Equipment Hardening 204</p> <p>9.4 Rack Densification 205</p> <p>9.4.1 Heterogenous Servers 207</p> <p>9.4.2 Processor Densification 208</p> <p>9.4.3 Supporting Equipment 210</p> <p>9.5 Parallel Accelerators 211</p> <p>9.5.1 Field Programmable Gate Arrays (FPGAs) 213</p> <p>9.5.2 Tensor Processing Units (TPUs) 213</p> <p>9.5.3 Graphics Processing Units (GPUs) 214</p> <p>9.5.4 Smart Network Interface Cards (NICs) 215</p> <p>9.5.5 Cryptographic Accelerators 216</p> <p>9.5.6 Other Accelerators 217</p> <p>9.5.7 FPGA, TPU, or GPU? 217</p> <p>9.6 Ideal Infrastructure 218</p> <p>9.6.1 Network Compute Utilisation 218</p> <p>9.7 Adapting Legacy Infrastructure 221</p> <p>9.8 Summary 221</p> <p>References 222</p> <p><b>10 Multi-tier Device, Data Centre, and Network Resources 223</b></p> <p>10.1 Overview 223</p> <p>10.2 Multi-tier Resources 223</p> <p>10.3 Multi-tier Applications 226</p> <p>10.4 Core to Edge Applications 228</p> <p>10.5 Edge to Core Applications 230</p> <p>10.6 Infrastructure Edge and Device Edge Interoperation 231</p> <p>10.7 Summary 234</p> <p><b>11 Distributed Application Workload Operation 235</b></p> <p>11.1 Overview 235</p> <p>11.2 Microservices 235</p> <p>11.3 Redundancy and Resiliency 236</p> <p>11.4 Multi-site Operation 237</p> <p>11.5 Workload Orchestration 238</p> <p>11.5.1 Processing Requirements 240</p> <p>11.5.2 Data Storage Requirements 240</p> <p>11.5.3 Network Performance Requirements 241</p> <p>11.5.4 Application Workload Cost Profile 241</p> <p>11.5.5 Redundancy and Resiliency Requirements 242</p> <p>11.5.6 Resource Marketplaces 243</p> <p>11.5.7 Workload Requirement Declaration 243</p> <p>11.6 Infrastructure Visibility 244</p> <p>11.7 Summary 245</p> <p><b>12 Infrastructure and Application Security 247</b></p> <p>12.1 Overview 247</p> <p>12.2 Threat Modelling 247</p> <p>12.3 Physical Security 249</p> <p>12.4 Logical Security 250</p> <p>12.5 Common Security Issues 251</p> <p>12.5.1 Staff 251</p> <p>12.5.2 Visitors 252</p> <p>12.5.3 Network Attacks 252</p> <p>12.6 Application Security 253</p> <p>12.7 Security Policy 254</p> <p>12.8 Summary 255</p> <p><b>13 Related Technologies 257</b></p> <p>13.1 Overview 257</p> <p>13.2 Multi-access Edge Computing (MEC) 257</p> <p>13.3 Internet of Things (IoT) and Industrial Internet of Things (IIoT) 258</p> <p>13.4 Fog and Mist Computing 259</p> <p>13.5 Summary 260</p> <p>Reference 260</p> <p><b>14 Use Case Example: 5G 261</b></p> <p>14.1 Overview 261</p> <p>14.2 What Is 5G? 261</p> <p>14.2.1 5G New Radio (NR) 262</p> <p>14.2.2 5G Core Network (CN) 263</p> <p>14.3 5G at the Infrastructure Edge 264</p> <p>14.3.1 Benefits 264</p> <p>14.3.2 Architecture 264</p> <p>14.3.3 Considerations 265</p> <p>14.4 Summary 266</p> <p><b>15 Use Case Example: Distributed AI 267</b></p> <p>15.1 Overview 267</p> <p>15.2 What Is AI? 268</p> <p>15.2.1 Machine Learning (ML) 268</p> <p>15.2.2 Deep Learning (DL) 269</p> <p>15.3 AI at the Infrastructure Edge 270</p> <p>15.3.1 Benefits 270</p> <p>15.3.2 Architecture 271</p> <p>15.3.3 Considerations 272</p> <p>15.4 Summary 273</p> <p><b>16 Use Case Example: Cyber-physical Systems 275</b></p> <p>16.1 Overview 275</p> <p>16.2 What Are Cyber-physical Systems? 275</p> <p>16.2.1 Autonomous Vehicles 276</p> <p>16.2.2 Drones 278</p> <p>16.2.3 Robotics 280</p> <p>16.2.4 Other Use Cases 280</p> <p>16.3 Cyber-physical Systems at the Infrastructure Edge 280</p> <p>16.3.1 Benefits 280</p> <p>16.3.2 Architecture 281</p> <p>16.3.3 Considerations 282</p> <p>16.4 Summary 282</p> <p>Reference 283</p> <p><b>17 Use Case Example: Public or Private Cloud 285</b></p> <p>17.1 Overview 285</p> <p>17.2 What Is Cloud Computing? 286</p> <p>17.2.1 Public Clouds 286</p> <p>17.2.2 Private Clouds 287</p> <p>17.2.3 Hybrid Clouds 287</p> <p>17.2.4 Edge Cloud 288</p> <p>17.3 Cloud Computing at the Infrastructure Edge 288</p> <p>17.3.1 Benefits 288</p> <p>17.3.2 Architecture 289</p> <p>17.3.3 Considerations 290</p> <p>17.4 Summary 290</p> <p><b>18 Other Infrastructure Edge Computing Use Cases 291</b></p> <p>18.1 Overview 291</p> <p>18.2 Near Premises Services 291</p> <p>18.3 Video Surveillance 293</p> <p>18.4 SD-WAN 294</p> <p>18.5 Security Services 295</p> <p>18.6 Video Conferencing 296</p> <p>18.7 Content Delivery 297</p> <p>18.8 Other Use Cases 298</p> <p>18.9 Summary 299</p> <p><b>19 End to End: An Infrastructure Edge Project Example 301</b></p> <p>19.1 Overview 301</p> <p>19.2 Defining Requirements 301</p> <p>19.2.1 Deciding on a Use Case 302</p> <p>19.2.2 Determining Deployment Locations 304</p> <p>19.2.3 Identifying Required Equipment 306</p> <p>19.2.4 Choosing an Infrastructure Edge Computing Network Operator 307</p> <p>19.2.5 Regional or National Data Centres 307</p> <p>19.3 Success Criteria 307</p> <p>19.4 Comparing Costs 308</p> <p>19.5 Alternative Options 309</p> <p>19.6 Initial Deployment 310</p> <p>19.7 Ongoing Operation 311</p> <p>19.7.1 SLA Breaches 312</p> <p>19.8 Project Conclusion 312</p> <p>19.9 Summary 314</p> <p><b>20 The Future of Infrastructure Edge Computing 315</b></p> <p>20.1 Overview 315</p> <p>20.2 Today and Tomorrow 315</p> <p>20.3 The Next Five Years 316</p> <p>20.4 The Next 10 Years 316</p> <p>20.5 Summary 316</p> <p><b>21 Conclusion 317</b></p> <p>Appendix A: Acronyms and Abbreviations 319</p> <p>Index 323</p>
<p><b>Alex Marcham</b> has been working in infrastructure edge computing from the shaping of the market and establishment of the terminology and key concepts at numerous companies and open source projects which have been leading its development. Alex has been involved with most elements of infrastructure design and deployment as well as the architecture and development of the key use cases for this tier of Internet infrastructure.</p>
<p><b>A comprehensive review of the key emerging technologies that will directly impact areas of computer technology over the next five years</b></p><p>Infrastructure edge computing is the model of data center and network infrastructure deployment which distributes a large number of physically small data centers around an area to deliver better performance and to enable new economical applications. It is vital for those operating at business or technical levels to be positioned to capitalize on the changes that will occur as a result of infrastructure edge computing.</p><p>This book provides a thorough understanding of the growth of internet infrastructure from its inception to the emergence of infrastructure edge computing. Author Alex Marcham, an acknowledged leader in the field who coined the term ‘infrastructure edge computing,’ presents an accessible, accurate, and expansive view of the next generation of internet infrastructure. The book features illustrative examples of 5G mobile cellular networks, city-scale AI systems, self-driving cars, drones, industrial robots, and more—technologies that increase efficiency, save time and money, and improve safety. Covering state-of-the-art topics, this timely and authoritative book:</p><ul><li>Presents a clear and accurate survey of the key emerging technologies that will impact data centers, 5G networks, artificial intelligence and cyber-physical systems, and other areas of computer technology</li><li>Explores how and why Internet infrastructure has evolved to where it stands today and where it needs to be in the near future</li><li>Covers a wide range of topics including distributed application workload operation, infrastructure and application security, and related technologies such as multi-access edge computing (MEC) and fog computing</li><li>Provides numerous use cases and examples of real-world applications which depend upon underlying edge infrastructure</li></ul><p>Written for Information Technology practitioners, computer technology practitioners, and students, <i>Understanding Infrastructure Edge Computing</i> is essential reading for those looking to benefit from the coming changes in computer technology.</p>

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €