Edge Computing Patterns for Solution Architects Learn Methods and Principles of Resilient Distributed Application Architectures from Hybrid Cloud to Far Edge
Master edge computing architectures, unlock industry-specific patterns, apply proven best practices, and progress from basics to end-to-end solutions Key Features Unlock scalable edge solutions by mastering proven archetypes for real-world success Learn industry-specific patterns, tailoring solution...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham, England :
Packt Publishing
[2024]
|
Edition: | First edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009799144006719 |
Table of Contents:
- Cover
- Title Page
- Copyright and Credits
- Contributors
- Table of Contents
- Preface
- Part 1: Overview of Edge Computing as a Problem Space
- Chapter 1: Our View of Edge Computing
- Suggested pre-reading material
- Speaking like an edge native
- What is the edge?
- Are the edge and the cloud extremes of the same thing?
- How does edge computing bring value, and why now?
- Which edge? Categorizing edges
- The user edge - field-deployed compute
- The SP edge - regional compute
- Your computer or mine? Tactics for service deployment
- Edge computing doesn't require dedicated resources
- Single device, running multiple applications simultaneously
- Single device, alternating applications by schedule or purpose
- Hosted edge infrastructure - applications on shared compute
- Cloud-out versus edge-in
- Looking deeper at cloud-out architectures
- Delving into edge-in architectures
- Introducing archetype patterns
- What is an archetype?
- The days of software creation
- Deploying archetype patterns
- Summary
- Chapter 2: Edge Architectural Components
- Edge components
- Functional requirements
- Sensing
- Inferencing
- Analytics
- Data
- Non-functional requirements
- Security
- Service management and operations
- Edge use cases and patterns
- Edge device specifications and protocols
- Architectural decisions
- Grouping edge ADs
- Cloud
- Network
- Server/cluster
- Device
- Summary
- Part 2: Solution Architecture Archetypes in Context
- Chapter 3: Core Edge Architecture
- Suggested pre-reading material
- What is legacy IoT architecture?
- A bit of history
- Purpose and promise
- Fundamental drawbacks
- Device configuration
- Rationale
- Architectural element categories
- Edge devices versus edge hub
- Reviewing the pattern
- Self-propelled inspection robot example
- Containers.
- Disconnected operations
- Summary
- Chapter 4: Network Edge Architecture
- Definitions
- NFV
- NFV considerations
- SDN
- VNF, NFV, SDN, and edge computing
- Underlay and overlay networks
- Network traffic management
- MEC
- Network edge architecture
- RAN
- CSPs and hyperscalers
- Sample architectures
- Manufacturing scenario
- Healthcare scenario
- Campus network scenario
- Summary
- Chapter 5: End-to-End Edge Architecture
- IT and OT convergence
- AI and edge computing
- Industrial edge scenario
- Manufacturing scenario
- Retail edge scenario
- Retail store scenario
- Network slicing
- Example scenario
- Edge reference architecture
- The cloud
- The network
- The edge
- Edge and distributed cloud computing
- Distributed cloud computing
- The scenario
- Summary
- Part 3: Related Considerations and Concluding Thoughts
- Chapter 6: Data Has Weight and Inertia
- Suggested pre-reading material
- Data encryption
- Motivations for encrypting data
- Protecting data without making it difficult to use
- Ensuring that data modifications are noticeable
- Data storage and management
- Strategies for defining and enforcing data policies
- Usage options ranging from real to synthetic data
- Rules of thumb for retaining data, or not
- Using data to build machine learning (ML) models
- The promise of foundation models
- How small and efficient can we make models?
- Customizing existing models for each deployment
- Using general-purpose platforms rather than single-purpose applications
- Connectivity and the data plane
- Optimizing data availability without connectivity
- Aggregating data versus keeping it distributed
- Migrating data files automatically
- Summary
- Chapter 7: Automate to Achieve Scale
- Automating service delivery
- DevOps
- Infrastructure as code
- Extending automation to the edge.
- Developing edge applications
- Scalability with automation
- Prepping an edge device
- Prepping an edge cluster
- Operational security
- Limiting physical access
- Limiting connectivity
- Trusted hardware and provisioning
- Trusted data
- Trusted compute
- Tactical Edge
- Automation with AI
- LLMs and generative AI
- Using AI in automation
- Summary
- Chapter 8: Monitoring and Observability
- Monitoring and observability
- How monitoring works
- How observability works
- How network observability works
- Measuring to improve
- Network observability example
- What to measure
- Real user monitoring
- Network performance management
- Anomaly detection
- Capacity
- Business outcomes
- Improving edge solution
- Monitoring challenges at the edge
- Configuration changes at the edge
- Edge application monitoring
- Personas
- Summary
- Chapter 10: Connect Judiciously but Thoughtlessly
- Suggested pre-reading material
- Declarative versus imperative configuration
- Comparing the two approaches
- What slows down application deployment on the edge?
- Solutioning edge-connected networks and applications
- Zero Trust or as close as you can get
- Managing secrets on the edge
- Zero Trust architectures in edge computing
- Secure access service edge
- Overlay, underlay, and shared responsibilities
- The network underlay
- The network overlay
- Zero Trust Network Access
- End-to-end encryption
- Application-centric networking
- Summary
- Chapter 10: Open Source Software Can Benefit You
- Suggested pre-reading material
- Open source and edge computing
- Edge computing and OSS are intertwined
- Do you really need to create that component?
- Creating and supporting an open source program office (OSPO)
- A software bill of materials is your friend
- Using SBOMs to track software dependencies.
- The characteristics of a mature OSS project
- How to nurture and assist projects you rely on
- Responses to projects that stray from their mission
- Common objections
- Recommendations for contributing code
- Let the cat out of the bag (Successfully open source your code and documentation)
- Five options for open sourcing
- What to open source
- Summary
- Chapter 11: Recommendations and Best Practices
- Suggested pre-reading material
- Edge-native best practices as an outgrowth of cloud native
- Pulling can be more secure than pushing
- Application dependency resolution approaches
- Deployment models for distributed edge applications compared
- Making antifragile applications
- Defining the terms
- What are your current areas of weakness or vulnerability?
- Properties of antifragile architectures
- An ounce of prevention...
- When things go wrong
- What to avoid
- Anti-patterns
- How to recover, gracefully or not
- Summary
- Index
- Other Books You May Enjoy.