Abstract

Edge computing simply refers to an emerged technology for processing collected data. The use of an edge-computing version enables the computations to carry out within the nodes in the edge network systems. With the quick evolution of the Internet of Everything (IoE), the quantity of smart gadgets associated with the Internet is expanding, bringing about huge scope information, which has caused issues, for example, poor security and protection in the existing computing models. Specifically, edge computing has been extended to reduce privacy and security risks and enhance network performance in data transmission. Edge computing tasks communicates between IOT applications; thus basic tasks include the data sources, which is a place in which the data are kept and recorded from other data sources or clients, data processing steps, where the collected data are accessed and used to reveal insight patterns-based machine learning mechanisms and demonstrating the result from the previous phase in visualization tools the newest developments around technologies in edge computing that are driving social and business growth and innovation. Therefore, educational and industrial researchers have put many efforts to study the advancements of edge computing technology. The main purpose of this review paper is to explore the deployment of the 5G network in this faster and localized edge infrastructure, The architecture of edge computing along with the some of the popular application of Edge computing and limitation of the edge computing in 5g are explained.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.