BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI
WORK INTEGRATED LEARNING PROGRAMMES
Digital Learning
Part A: Course Design
Course Title Edge Computing
Course No(s) SS ZG 5XX
Credit Units 5
Content Authors Chandra Shekar RK
Version 1.0
Course Description
Introduction, What Is Edge Computing, Why Do We Need Edge Computing, Key Techniques that Enable
Edge Computing, Definition, Benefits, Edge Computing Systems, Multi Access Edge Computing, To Edge or
Not to Edge, The Cloud Part of MEC, The Edge Part of MEC, The Access Part of MEC, Challenges and
Opportunities in Edge Computing, Service Management, Privacy and Security, Application Distribution,
Edge Computing Tools, Virtualization, Resource Management, Edge Analytics, Conceptual Framework for
Security and Privacy in Edge Computing, Overview of Security, Privacy, and Threats in Edge Computing,
Framework for Security and Privacy in Edge Computing, case study and use cases
Course Objectives
The course aims at:
CO1 Introducing the Edge computing and need for edge computing
CO2 Developing understanding about the architecture, design of edge computing and its benefits over
cloud computing
CO3 Exploring the Multi-access edge computing and its challenges and benefits
CO4 Developing understanding about Security, Privacy and threats in Edge computing
Text Book(s)
T1 Edge Computing: A Primer, Jie Cao • Quan Zhang • Weisong Shi, Springer
T2 Multi-Access Edge Computing in Action, Dario Sabella, Alex Reznik, Rui Frazao, CRC press
T3
Reference Book(s) & other resources
R1 Edge Computing from Hype to reality, Fadi Al Turjman,
R2
R3
Learning Outcomes:
Students will :
LO1 Get an overview of Edge computing, its architectures and advantages
LO2 Appreciate the necessity and usage of edge computing in different domains
LO3 Appreciate the need for security in Edge computing
LO4 Recognize the role of edge computing involving multiple access points
Part B: Course Handout
Academic Term
Course Title
Course No
Lead Instructor
Glossary of Terms
Module M Module is a standalone quantum of designed content. A typical course is
delivered using a string of modules. M2 means module 2.
Contact Hour CH Contact Hour (CH) stands for an hour long live session with students
conducted either in a physical classroom or enabled through technology.
In this model of instruction, instructor led sessions will be for 32 CH.
Recorded RL RL stands for Recorded Lecture or Recorded Lesson. It is presented to the
Lecture student through an online portal. A given RL unfolds as a sequences of
video segments interleaved with exercises.
Lab Exercises LE Lab exercises associated with various modules
Self-Study SS Specific content assigned for self-study
Homework HW Specific problems/design/lab exercises assigned as homework
Modular Structure
Module Summary
No. Content of the Module
M1 1 Introduction
1.1 What Is Edge Computing
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge Computing
1.1.3 Edge Computing Definition
1.1.4 Edge Computing Benefits
1.1.5 Edge Computing Systems
M2 2 Multi Access Edge Computing
2.1 To Edge or Not to Edge
2.2 The Cloud Part of MEC
2.3 The Edge Part of MEC
2.4 The Access Part of MEC
2.4.1 Real-Time Data Processing
2.4.2 SLAs and Regulatory Requirements
M3 3 Challenges and Opportunities in Edge Computing
3.1 Programmability
3.2 Naming
3.3 Data Abstraction
3.4 Service Management
3.5 Privacy and Security
3.6 Application Distribution
3.7 Scheduling Strategies
3.8 Business Model
M4 4 Existing Edge Computing Tools
4.1 What Is Your Role in Edge Computing?
4.2 Virtualization
4.2.1 Virtual Machine and Container
4.2.2 Network Virtualization
4.3 Resource Management
4.3.1 Kubernetes and Docker
4.4 Developing Platforms for Edge Computing
4.4.1 Edge Analytics
4.4.2 Development Tools and Platforms
M5 5 A Conceptual Framework for Security and Privacy in Edge Computing
5.1 Introduction
5.2 Similarities and Differences Between Edge Paradigms
5.3 Overview of Security, Privacy, and Threats in Edge Computing
5.4 Framework for Security and Privacy in Edge Computing
M6 6 EdgeOS: A Home Operating System for Internet of Everything
6.1 Introduction
6.2 Related Work
6.3 EdgeOS: Overview and Design
6.3.1 Overview
6.3.2 Design
M7 7 MEC Use Cases and Service Scenarios
7.1 Intelligent Video Acceleration
7.2 Video Stream Analysis
7.3 Augmented Reality
7.4 Assistance for Intensive Computation
7.5 MEC in the Enterprise Setting
7.6 Connected Vehicles
7.7 IoT Gateway
7.7.1 Public Edge Clouds
Detailed Structure
Contact List of Topic Title Topic # Text/Ref Book/external
Hour (from content structure in Part A) (from content resource
structure in Part
A)
1 1 Introduction T1, CH 1
1.1 What Is Edge Computing
2
1.1.1 Why Do We Need Edge Computing
1.1.2 Key Techniques that Enable Edge
Computing
3 1.1.3 Edge Computing Definition T1, CH 1
1.1.4 Edge Computing Benefits
4
1.1.5 Edge Computing Systems
5 2 Multi Access Edge Computing T2, CH 1
2.1 To Edge or Not to Edge
6
2.2 The Cloud Part of MEC
2.3 The Edge Part of MEC
7 2.4 The Access Part of MEC T2, CH 1
2.4.1 Real-Time Data Processing
8
2.4.2 SLAs and Regulatory Requirements
9 3 Challenges and Opportunities in Edge T1, CH 5
Computing
10
3.1 Programmability
3.2 Naming
3.3 Data Abstraction
3.4 Service Management
11 3.5 Privacy and Security T1, CH 5
3.6 Application Distribution
12 3.7 Scheduling Strategies
3.8 Business Model
13 4 Existing Edge Computing Tools T1, CH 6
4.1 What Is Your Role in Edge Computing?
14
4.2 Virtualization
4.2.1 Virtual Machine and Container
15 4.2.2 Network Virtualization T1, CH 6
4.3 Resource Management
16
4.3.1 Kubernetes and Docker
17 4.4 Developing Platforms for Edge T1, CH 6
Computing
18
4.4.1 Edge Analytics
4.4.2 Development Tools and Platforms
19 5 A Conceptual Framework for Security R1, CH 10
and Privacy in Edge Computing
20
5.1 Introduction
5.2 Similarities and Differences Between
Edge Paradigms
21 5.3 Overview of Security, Privacy, and R1, CH 10
Threats in Edge Computing
22
5.4 Framework for Security and Privacy in
Edge Computing
23 6 EdgeOS: A Home Operating System for T1, CH 2
Internet of Everything
24
6.1 Introduction
6.2 Related Work
25 6.3 EdgeOS: Overview and Design T1, CH 2
6.3.1 Overview
26
6.3.2 Design
27 7 MEC Use Cases and Service Scenarios T2, CH 2
7.1 Intelligent Video Acceleration
28
7.2 Video Stream Analysis
7.3 Augmented Reality
29 7.4 Assistance for Intensive Computation T2, CH 2
7.5 MEC in the Enterprise Setting
30
7.6 Connected Vehicles
7.7 IoT Gateway
7.7.1 Public Edge Clouds
31 Labs
32
Experiential Leaning Component
Lab Topic Description
1 EC2 – Creating Virtual
machines, Scaling,
Availability
2 Dockers – Creating
containers
Building Containers
using Dockerfile
2 Simulation –
PureEdgeSim
4 Simulation –
EdgeCloudSim
5 Kubernetes
6 AWS – IoT, GreenGrass
7
Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
No Name Type Duration Weight Day, Date, Session, Time
Experiential learning Take 15 days 15% TBA
EC-1 Assignment-I Home
Experiential learning Take 15 days 15% TBA
Assignment-II Home
EC-2 Mid-Semester Test Closed 2 hours 30% Per programme schedule
Book
EC-3 Comprehensive Open 3 hours 40% Per programme schedule
Exam Book
Syllabus for Mid-Semester Test (Closed Book): Topics in Session Nos. 1 to 8
Syllabus for Comprehensive Exam (Open Book): All topics (Session Nos. 1 to 16)
Important links and information:
Elearn portal: https://elearn.bits-pilani.ac.in
Students are expected to visit the Elearn portal on a regular basis and stay up to date with the latest
announcements and deadlines.
Contact sessions: Students should attend the online lectures as per the schedule provided on the Elearn portal.
Evaluation Guidelines:
1. EC1 consists of two assignments. Announcements will be made available on the portal, in a timely
manner.
2. For Closed Book tests: No books or reference material of any kind will be permitted.
3. For Open Book exams: Use of books and any printed / written reference material (filed or bound) is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all
exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
4. If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student
should follow the procedure to apply for the Make-Up Test/Exam which will be made available on the
Elearn portal. The Make-Up Test/Exam will be conducted only at selected exam centres on the dates to
be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self-study schedule as
given in the course handout, attend the online lectures, and take all the prescribed evaluation components such
as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.