Multi-access Edge Computing – Part 1: How does Multi-access Edge Computing work?

Multi-access Edge Computing – Part 1: How does Multi-access Edge Computing work?

Multi-access edge computing (MEC), also known as mobile edge computing, is a network architecture that provides network operators and service providers with cloud computing capabilities and an IT service environment at the edge of the network. The concept of MEC has become increasingly popular over the past few years, and in this three-part MEC series, we will learn how multi-access edge computing works, the security challenges it faces and how it can be protected, and how it can be used to improve networks and services.

[[242730]]

Multi-access edge computing is one of the hottest topics discussed today when it comes to technologies that will enable network operators and service providers to realize the potential of enhanced network architectures and the Internet of Things.

The European Telecommunications Standards Institute (ETSI) changed its name from mobile edge computing to multi-access edge computing to allow for a more heterogeneous approach, and multi-access edge computing has now opened the way from mobile to Wi-Fi and other access technologies.

In this first of three articles on Multi-Access Edge Computing, we'll look at how MEC has evolved, how it works, and look at some examples of how it's being used today. So, let's start with MEC!

Why choose multi-access edge computing?

While initially showing great promise in mobile technology, edge computing has begun to demonstrate that it can also be applied to other access technologies such as Wi-Fi.

For example, much of the data created by IoT and smart devices needs to be collected and responded to in near real-time. Data-generating processes such as network services, connected manufacturing equipment, automated critical infrastructure, or automated vehicles can have a significant impact on network operators and service providers, manufacturing and utilities, and people’s lives if data processing delays hinder their ability to function properly.

To combat network latency and enable enhanced performance and next-generation network services and features, operators and service providers are looking to multi-access edge computing to change the current landscape.

The logic behind MEC is very simple. The farther away from the source data is processed, analyzed, and stored, the higher the latency experienced.

By processing, analyzing and storing data generated at the network edge, operators and providers can offer enhanced response times and improved services, while also laying the foundation for more advanced concepts such as driverless vehicles and enhanced automation.

Benefits of MEC

The benefits of multi-access edge computing exist in a variety of venues and applications. Most obviously, it allows network operators and service providers to reduce latency in their services in order to improve the overall customer experience while introducing new high-bandwidth services without the latency issues mentioned earlier.

These are all great ways to apply MEC to enhance business and operations, but multi-access edge computing has other benefits as well.

Security is also one of the advantages of multi-access edge computing, and many MEC systems use local, dedicated connections to ensure data security. In addition to security, multi-access edge computing systems can be integrated into any wireless network infrastructure, including wireless, cellular, or a combination of both.

The increase in IT resources and applications, as well as the ability to run higher bandwidth network processes, looks set to further increase technological innovation in this area and contribute to the emergence of future MEC networks.

Emerging technologies such as self-driving cars will rely on real-time data analysis in order to operate safely, and some believe that multi-access edge computing will help make this possible.

Use Cases

Although MEC is still in its infancy, there are some use cases that we can leverage to further improve our understanding of how multi-access edge computing works in real-world scenarios. The following three use cases demonstrate how network operators and service providers expect to use MEC architecture in the future.

1. Industry

In industrial use cases, the distributed cloud environment that multi-access edge computing can provide is invaluable for the various applications it subsequently enables. In the case of critical infrastructure, real-time data analytics can notify engineers as soon as any anomalies occur, thereby avoiding failures and unnecessary repairs.

2. Enterprise

Much like industrial use cases, MEC brings many of the same benefits to enterprise environments. For example, if data is processed, stored, and analyzed close to the source, security and monitoring capabilities can be greatly improved, thereby improving overall safety. This is also true for behavioral analysis of customers in the retail industry, for example.

3. Entertainment

In the entertainment industry, multi-access edge computing can be leveraged to provide a better customer experience in areas such as stadiums, events, and performances. Multi-player or action cam and other similar services can also be provided without the typical associated bandwidth and latency issues that have long plagued these.

In this second part of the MEC series, we will look at the security challenges faced by multi-access edge computing and try to understand how to best protect MEC from these challenges.

Original link:

https://www.lanner-america.com/blog/multi-access-edge-computing-part-1-multi-access-edge-computing-work/

<<:  Making cities smarter! Huawei's smart city nervous system demonstrates stronger capabilities from bottom to top

>>:  What should you consider before looking for an SD-WAN provider?

Recommend

The role of fiber in integrated infrastructure development

In the past, people settled near the banks of riv...

How to deploy multiple computer rooms? How to synchronize data?

Author: Guo Guanhua, unit: China Mobile Smart Hom...

Internet Service Providers, how much do you know about the terminology?

To fully understand the network and its capabilit...

Ethernet in IoT Still Has a Role in the Wireless Era

When it comes to the Internet and cloud computing...

It is an inevitable trend to open up the 6GHz spectrum to 5G in the future

At the 7th Asia-Pacific Spectrum Management Confe...

How difficult is it for a woman to work in communications?

It is well known that the number of women working...

Wireless router, how many little secrets do you have?

Everyone has a wireless router at home. However, ...

5G messaging is about to be launched in the commercial use countdown

5G messaging is regarded as a major business inno...