Edge Computing

Why Trust Techopedia

What is Edge Computing?

Edge computing is a distributed network architecture that processes data as close to the originating source as possible.

Advertisements

An important goal of edge computing is to minimize latency and optimize the bandwidth cost by decreasing the amount of data that needs to be transmitted over long distances. Data is typically processed on the originating device itself, on nearby network nodes, or on local servers.

What is Edge Computing?

Key Takeaways

  • Edge computing reduces latency by processing data as close to the source as possible.
  • Processing data close to the source can be cost-effective because it conserves bandwidth.
  • Edge computing wasn’t practical until recent advances in technology.
  • There are four main types of edge computing.
  • Security is an important concern because every edge device is a potential attack surface.

How Edge Computing Works

Edge computing decentralizes data processing by allowing digital and electromechanical devices that produce data to process their own data locally. In this context, locally can mean on-device or on a nearby server or network node.

Edge computing was not practical until recently. Recent advancements in information technology (IT) that have enabled edge computing include:

Types of Edge Computing

Types of Edge Computing 

Edge computing initiatives are often categorized by the way they handle computational workloads.

Device Edge
Initiatives process data directly on individual edge devices. This provides the lowest latency but its implementation can be limited by the device’s computational resources.

Near Edge
Initiatives process data in small data centers located close to the data source. This approach provides more computational power than device edge initiatives while still maintaining low latency.

Private Edge
Initiatives process data on IT infrastructure that is owned and managed by a specific enterprise. This approach provides the best control over data and security, but it requires bigger investments in hardware and staffing expertise.
Public Edge
Initiatives process data on infrastructure that belongs to a third-party service provider. This approach provides scalability but offers less control over latency and data sovereignty.

Edge Computing vs. Fog Computing, MEC Computing & Cloud Computing

Now that you are familiar with edge computing’s definition, you may be wondering how fog computing and multi-access edge computing (MEC) compare. These concepts are often used interchangeably, but they have distinct differences.

While all three involve processing data closer to the source than cloud computing, they operate at different network levels and serve slightly different purposes.

Edge ComputingFog ComputingMulti-Access Edge Computing (MEC)

Purpose: Reduce latency, conserve bandwidth, and enable on-device processing.

Use Cases: Best for applications that need to process data immediately.

Connectivity: Does not rely on Internet connectivity.

Purpose: Aggregate and filter data from multiple edge devices before sending relevant information to the cloud.

Use Cases: Best for applications that can process data on local servers or network nodes.

Connectivity: Requires Internet connectivity at some point.

Purpose: Provide mobile users with real-time access to network and cloud resources.

Use Cases: Best for mobile applications that require ultra-low latency and high bandwidth.

Connectivity: Relies on cellular infrastructure for Internet connectivity.

Edge Computing Use Cases

Edge computing is increasingly being used in many industries and market segments to enhance operational efficiency and support decision-making capabilities in real time.

Arguably, the three most important use cases that are driving data processing at the network edge are:

  1. The need to process data in real-time.
  2. The need to process data produced by thousands of Internet of Things (IoT) devices as inexpensively as possible.
  3. The need for increased device autonomy in remote or disconnected environments.

Edge Computing Examples

Here are some examples that illustrate how edge computing is being used to reduce latency and enable real-time decision-making across various industries and applications:

Advanced driver-assistance systems (ADAS)
Use edge computing to process data from sensors and cameras locally and provide driver alerts in real time. 

Smart thermostats
Process sensor data locally to optimize energy usage without relying on Internet connectivity. 

Content delivery networks (CDNs)
Use proprietary edge servers to reduce the load on origin servers and improve delivery times for website and video content
Traffic cameras and roadside sensors
Use edge computing to analyze data about traffic patterns and autonomously optimize traffic flow. 
Intelligent sensors in precision agriculture
Edge devices that can analyze soil conditions, weather patterns, and crop health without relying on Internet connectivity.
Wearable medical devices
Designed to process patient data locally so they can immediately issue alerts if necessary.
Retail smart shelves use AI-supported edge computing
Track inventory, monitor product freshness, and personalize customer experiences through targeted promotions.

When manufacturing plants use edge computing, advanced electromechanical equipment can schedule their own maintenance autonomously.

Importance of Security at the Edge

Security plays an important role in edge computing because the distributed network architecture expands the attack surface for cyberthreats.

Each edge device needs to be supported by network security protocols that can detect and mitigate zero day threats locally to minimize the risk that one compromised device could jeopardize an entire network.

The physical security of edge devices is also a significant concern.

To prevent physical tampering or theft, it’s important to implement stringent security measures that can verify the integrity of the device’s firmware and software. Password managers can be used to securely store and manage complex credentials for accessing edge devices.

Edge Computing and Data Privacy

Data privacy is another important concern for organizations that allow data to be processed at the edge.

When sensitive data is processed close to its source, it reduces the amount of data that needs to be transmitted to centralized or distributed data centers. However, it also means that sensitive information will be managed by edge devices that could be compromised.

Access controls with authentication mechanisms should be used to ensure that only authorized personnel and systems can access sensitive or personally identifiable information (PII) that is processed and/or stored on edge devices.

Edge Computing Pros and Cons

While edge computing offers significant benefits in terms of reducing latency, using bandwidth efficiently, and making decisions in real time, it also presents challenges related to cybersecurity and data privacy that need to be carefully managed.

Pros

Cons

  • Increased attack surface
  • Requires stringent device management policies.
  • Requires edge computing implementations to comply with relevant data protection regulations.

The Bottom Line

Edge computing’s meaning and use cases have evolved as technology has advanced and the demand for real-time data processing and low-latency applications has increased.

Today, edge computing can provide significant advantages in terms of reduced latency and bandwidth efficiency; however, its implementation requires careful planning and consideration of factors like hardware selection, security, and regulatory compliance.

Organizations need to carefully evaluate their specific use cases, infrastructure, and resources to determine if the benefits of edge computing outweigh these challenges.

FAQs

What is edge computing in simple terms?

What are examples of edge computing?

What is edge vs. cloud?

What best describes edge computing?

Advertisements

Related Terms

Margaret Rouse
Technology expert
Margaret Rouse
Technology expert

Margaret is an award-winning writer and educator known for her ability to explain complex technical topics to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles in the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret’s idea of ​​a fun day is to help IT and business professionals to learn to speak each other’s highly specialized languages.