There are a number of reasons why it can make sense for data to be processed on the ‘edge’ of a network. The most important are that this practice reduces delays (latency) and makes best use of the available bandwidth and processing power. If implemented correctly, edge computing can also help increase data security. Edge computing has many applications. Examples include:
1. Self-driving cars are entirely dependent at all times on local data processing and immediate feedback when determining how to respond to pedestrians and other vehicles.
2. Smart cities will be able to use the greater flow of data generated by the internet of things to improve the management of their services.
3. The health sector will be able to access patient-critical data more quickly.
4. Mobile phones use their own processing power to verify fingerprints and faces. Some security checks are accordingly transferred from centralised cloud services to consumers’ private mobile devices. TouchID and FaceID from Apple are examples of how edge computing can be used to improve data security.
5. Networks such as mobile phone base stations and your internet router are good examples of edge systems.
6. Sources of measurements, such as telemetry and readings from various types of equipment such as electricity and water meters or installations associated with oil and gas extraction, are other examples of edge systems.
Edge computing will become increasingly relevant as the number of IoT devices explodes in parallel with the ever-increasing amount of data located in various cloud services. We can also see that the need for immediate data processing will increase as 5G changes patterns of demand and becomes an important driver for edge computing.