Multi-access Edge Computing: The driver behind the wheel of 5G-connected cars

نویسندگان

  • Fabio Giust
  • Vincenzo Sciancalepore
  • Dario Sabella
  • Miltiades C. Filippou
  • Simone Mangiante
  • Walter Featherstone
  • Daniele Munaretto
چکیده

The automotive and telco industries have taken an investment bet on the connected car market, pushing for the digital transformation of the sector by exploiting recent Information and Communication Technology (ICT) progress. As ICT developments continue, it is expected that the technology advancements will be able to fulfill the sophisticated requirements for vehicular use cases, such as low latency and reliable communications for safety, high computing power to process large amount of sensed data, and increased bandwidth for on-board infotainment. The aforementioned requirements have received significant focus during the ongoing definition of the 3GPP 5G mobile standards, where there has been a drive to facilitate vertical industries such as automotive, in addition to providing the core aspects of the communication infrastructure. Of the technology enablers for 5G, Multi-access Edge Computing (MEC) can be considered essential. That is, a cloud environment located at the edge of the network, in proximity of the end-users and coupled with the service provider’s network infrastructure. Even before 5G is rolled out, current mobile networks can already target support for these challenging use cases using MEC technology. This is because MEC is able to fulfill low latency and high bandwidth requirements, and, in addition, it lends itself to be deployed at the vertical industrial sector premises such as road infrastructure, air/sea ports, smart factories, etc., thus, bringing computing power where it is needed most. This work showcases the automotive use cases that are relevant for MEC, providing insights into the technologies specified and investigated by the ETSI MEC Industry Specification Group (ISG), who were the pioneer in creating a standardized computing platform for advanced mobile networks with regards to network edge related use cases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

System architecture and deployment scenarios for SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services

The surge of the Internet traffic with exabytes of data flowing over operators’ mobile networks has created the need to rethink the paradigms behind the design of the mobile network architecture. The inadequacy of the 4G UMTS Long term Evolution (LTE) and even of its advanced version LTE-A is evident, considering that the traffic will be extremely heterogeneous in the near future and ranging fr...

متن کامل

Some results on vertex-edge Wiener polynomials and indices of graphs

The vertex-edge Wiener polynomials of a simple connected graph are defined based on the distances between vertices and edges of that graph. The first derivative of these polynomials at one are called the vertex-edge Wiener indices. In this paper, we express some basic properties of the first and second vertex-edge Wiener polynomials of simple connected graphs and compare the first and second ve...

متن کامل

Challenges and Enabling Technologies in 5G Wearable Communications

As wearable devices become more ingrained in our daily lives, traditional communication networks primarily designed for human being-oriented applications are facing tremendous challenges. The upcoming 5G wireless system aims to support unprecedented high capacity, low latency, and massive connectivity. In this article, we evaluate key challenges in wearable communications. A cloud/edge communic...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018