Share this
What is multi-access edge computing (MEC)?
by Christopher Trick on May 1, 2023 8:35:11 AM
The increasing demand for low-latency and high-bandwidth applications and services, such as augmented reality, virtual reality, and Internet of Things (IoT), has led to the popularity of multi-access edge computing (MEC) as a solution to improve the performance and efficiency of the network.
In this blog, you'll learn more about multi-access edge computing, how it works, various use cases, and where Trenton's solutions come into play.
What is multi-access edge computing (MEC)?
Multi-access edge computing (MEC, formerly known as mobile edge computing, is a distributed computing architecture that brings computational capabilities and services closer to the end-users and devices at the network edge.
In MEC, computation, storage, and network resources are placed at the network edge, in proximity to end-users, devices, and sensors, instead of being centralized in data centers located farther away.
The "multi-access" in multi-access edge computing (MEC) refers to the ability of MEC to support multiple types of access technologies, such as cellular, Wi-Fi, and wired connections, and to enable seamless connectivity across different access networks.
In other words, different devices to access different types of technologies simultaneously, depending on their availability and proximity, and seamlessly switch between them as needed.
MEC can be deployed in different types of access networks, such as 5G, LTE, Wi-Fi, and fixed-line networks, and can provide computing resources and services to devices and applications connected to these networks.
MEC also enables the convergence of different access technologies and the coordination of multiple access points, allowing devices to seamlessly switch between different networks and access points while maintaining the same level of service and performance.
For example, a user can start streaming a video over Wi-Fi and continue watching it while moving to a cellular network, without any interruption or degradation in quality, thanks to MEC's ability to provide a consistent computing environment and optimize the use of network resources.
How does multi-access edge computing work?
Multi-access edge computing (MEC) works by deploying computational, storage, and network resources at the network edge, typically in small data centers or computing nodes located near cell towers, base stations, or access points.
MEC servers are interconnected with the core cloud infrastructure and can be accessed by end-users and devices via wireless or wired connections. MEC servers can run various types of applications and services, such as video processing, data analytics, machine learning, content caching, and more.
When a device or an application requests a service, the MEC server closest to the device or the application processes the request and returns the response, without sending the data to the cloud. This reduces the latency and the bandwidth requirements and improves the overall performance and efficiency of the network.
MEC servers can also communicate with each other and with the cloud infrastructure, enabling the deployment of distributed applications and services that can leverage the resources of multiple nodes.
To ensure the security and privacy of applications and data, MEC servers can use various mechanisms, such as encryption, access control, authentication, and authorization. MEC also enables the deployment of edge-based security services, such as intrusion detection, threat prevention, and data filtering.
What are the benefits of multi-access edge computing?
Multi-access edge computing (MEC) offers several benefits for both network operators and end-users. Some of the key benefits of MEC are:
- Low latency: By bringing computation and storage resources closer to the end-users and devices, MEC reduces the latency and improves the response time of applications and services, which is particularly important for real-time and interactive applications such as gaming, augmented reality, and virtual reality.
- Improved Quality of Service (QoS): MEC provides a consistent and reliable computing environment at the network edge, which can improve the QoS of various types of applications and services, such as video streaming, data analytics, and machine learning.
- Reduced network congestion: MEC offloads the core cloud infrastructure by distributing computing and storage resources to the network edge, which can reduce the network congestion and improve the network efficiency, particularly in densely populated areas.
- Enhanced security and privacy: MEC enables the deployment of edge-based security services, such as intrusion detection, threat prevention, and data filtering, which can enhance the security and privacy of applications and data by keeping them closer to the source and reducing the exposure to potential security threats in the network.
- Cost savings: MEC can reduce the communication costs by minimizing the data transfer between the devices and the cloud infrastructure, as well as reducing the load on the network and the core cloud infrastructure, which can result in cost savings for both network operators and end-users.
- New revenue streams: MEC enables the deployment of new types of services and applications that require low latency and high bandwidth, such as autonomous vehicles, smart cities, industrial automation, and healthcare, which can create new revenue streams for network operators and service providers.
Multi-Access Edge Computing Use Cases
Military Use Cases
Battlefield Communication
In a battlefield, military units need to communicate with each other and exchange real-time information, such as locations, maps, and target data, over secure and reliable communication channels. However, the communication infrastructure in a battlefield is often limited and prone to disruptions due to harsh environmental conditions and enemy attacks.
The challenge is to establish a robust and low-latency communication infrastructure that can support the communication needs of military units in a battlefield, without relying on centralized cloud infrastructure or vulnerable communication channels.
Multi-access edge computing can come into play by deploying computing and communication resources at the network edge, in proximity to the military units, and enabling secure and low-latency communication between the units. MEC servers can also provide real-time data analytics and situational awareness to the military units, allowing them to make informed decisions and respond to changing battlefield conditions quickly and effectively.
Autonomous Vehicles
In a military operation, autonomous vehicles such as drones and unmanned ground vehicles are used to perform various tasks, such as reconnaissance, surveillance, and target acquisition. However, the autonomous vehicles require real-time data processing and decision-making capabilities, which are often limited by the communication latency and bandwidth constraints in a battlefield.
The challenge is to enable autonomous vehicles to perform complex tasks and make real-time decisions, despite the limited computing and communication resources available in a battlefield.
Multi-access edge computing can come into play by deploying edge computing resources and services on the vehicles or at the network edge, allowing the vehicles to process data and make decisions locally, without relying on centralized cloud infrastructure or high-latency communication channels. MEC can also enable the coordination and collaboration between multiple autonomous vehicles, allowing them to perform complex tasks together and share the workload.
Critical Infrastructure Use Cases
Remote Monitoring and Control for Oil and Gas
In an oil and gas production facility, various sensors and equipment are used to monitor and control the production processes, such as temperature, pressure, and flow rate. However, the facility is often located in remote and harsh environments, with limited connectivity and unreliable communication channels.
The challenge is to enable remote monitoring and control of the production processes, despite the limited connectivity and harsh environmental conditions.
Multi-access edge computing can come into play by deploying edge computing resources and services at the facility, allowing the data from the sensors and equipment to be processed and analyzed locally, without relying on centralized cloud infrastructure or high-latency communication channels. MEC can also enable the remote control of the production processes, allowing operators to adjust the parameters and settings of the equipment in real-time, based on the analysis of the data.
Public Safety
In a public safety scenario, such as a natural disaster or a terrorist attack, various critical infrastructure systems, such as power grids, transportation networks, and communication systems, need to be maintained and operated under extreme conditions. However, the centralized control systems of the infrastructure are often vulnerable to disruptions and attacks, and the communication channels are often congested or unavailable.
The challenge is to ensure the resilience and continuity of the critical infrastructure systems, despite the disruptions and attacks, and to enable effective communication and coordination between the first responders and the operators.
Multi-access edge computing can come into play by deploying edge computing resources and services at the critical infrastructure sites, allowing the local operators to monitor and control the systems locally, without relying on centralized control systems or vulnerable communication channels. MEC can also enable the first responders to communicate and coordinate with the operators, using secure and low-latency communication channels, and to access real-time data and situational awareness from the infrastructure systems.
Where does Trenton Systems come into play?
At Trenton Systems, we provide our customers with COTS, TAA-compliant, 5G-powered computing solutions for enhanced compute/connectivity, increased scalability, and reduced total cost of ownership.
With Intel® Smart Edge and Intel® FlexRAN, our modular and non-modular rack mount servers and small form factor mission computers can work separately or together to provide multi-access edge computing capabilities to run multiple critical applications, networks, and services simultaneously in real-time at the edge.
We customize our solutions per customers most complex technical, performance, and environmental requirements. This includes the latest hardware- and software-based processing, intelligence, networking, security, and storage technologies, enhancing adaptability as workloads evolve.
Final thoughts
It offers several benefits, such as low latency, improved Quality of Service (QoS), reduced network congestion, enhanced security and privacy, cost savings, and new revenue streams.
MEC can be applied in various use cases, such as military communication, autonomous vehicles, remote monitoring and control for oil and gas, and public safety.
Trenton Systems provides customized computing solutions that can support the deployment of MEC infrastructure, enabling high-performance computing at the network edge.
Want to learn more about our multi-access edge computing capabilities? Just reach out to us anytime here.
Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Center Modular Hardware System (DC-MHS) (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- Open Compute Project (OCP) (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- November 2024 (1)
- October 2024 (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (8)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
No Comments Yet
Let us know what you think