Gorodenkoff - stock.adobe.com
Edge computing is the concept of pushing data processing to the edge of the network -- closest to where the data is generated. The idea of an edge computing architecture is to use an edge device's computational power, so data doesn't always have to be uploaded to a private data center or a cloud service provider's network to be processed.
The benefits of edge computing architecture are twofold. First, by pushing computational processes to the edge, edge computing reduces the amount of CPU needed in the cloud, which means cost savings.
The second benefit is less data traverses the network, because processing is performed locally at the edge. This results in network and performance efficiencies that can significantly boost application speeds.
Where SDN meets edge computing architecture
Software-defined networking (SDN) is a technology that can help bridge the gap when combining edge computing and traditional clouds. For example, SDN can be used to act as a decision-maker on whether tasks should be uploaded and processed in the cloud or at the edge.
SDN controllers include built-in AI that can determine when periods of high network utilization occur on specific links. The controller can then request more processing to be completed at the edge to eliminate network bottlenecks.
Both SDN and edge computing are still in the infancy stage. Likely, SDN will be implemented first, with edge computing following shortly after. As both technologies continue to increase in adoption rate, look for the pair to become increasingly intertwined.
Dig Deeper on Edge computing
Related Q&A from Andrew Froehlich
An IAM system introduces risks to the enterprise, but the consensus is the benefits of IAM outweigh the drawbacks. What are some of the issues that ... Continue Reading
The network edge is where an enterprise network connects to third-party network services. Edge computing is a distributed architecture that processes... Continue Reading
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but ... Continue Reading