The successor to 4G, 5G is the fifth-generation technology standard for broadband cellular networks being offered by communications service providers (CSPs).

Lately, we have been bombarded by 5G advertisements from telecommunications companies and service providers. And why not? Innovation in artificial intelligence (AI) applications has exploded with the advent and adoption of edge computing, and 5G has redefined the landscape of edge computing. It is fueling and accelerating the adoption of edge and AI technologies. Practical applications of 5G can be seen in the current pandemic environment in myriad examples. Billed as offering high bandwidth and low latency, these examples span many uses cases, from remote learning and gaming to sports viewing.

The combination of edge computing with 5G technology creates opportunities to enhance digital experiences, improve performance, and support data security. This blog post hopes to provide an introduction to 5G from an edge computing perspective.

Please make sure to check out all the installments in this series of blog posts on edge computing:

5G edge terminology

We have seen in earlier blog posts that edge computing enables new business opportunities across multiple industries. To understand what or how 5G enhances these use cases, let’s first get familiar with some 5G-related terminology:

  • gNB: gNodeB is the 5G base station that transmits and receives communications between the user equipment (UE) and the mobile network. It uses new radio access technology called New Radio (NR).
  • mmWave: Millimeter waves are typically used in 5G. They have a shorter range than microwaves, therefore the cells are limited to smaller sizes; the waves also have trouble passing through building walls. Millimeter wave antennas can be (and thus are) smaller than the large antennas used in previous cellular networks.
  • MEC: Multi-access Edge Computing is a network architecture where more processing, especially for latency-sensitive applications, stays closer to the edge of the mobile network.
  • NFV: Network Function Virtualization is a network architecture concept that uses the technologies of IT virtualization to virtualize entire classes of network node functions.
  • RAN: Radio Access Network is what connects user equipment to other parts of a mobile network via a radio connection. 5G allows for virtual Radio Access Network (vRAN) in addition to traditional physical network components.
  • SDN: Software Defined Networking is the approach of using open protocols for remote configuration of network switches and routers.
  • UPF: User Plane Function is the 5G equivalent of the packet gateway. This function includes features to support packet routing and forwarding, interconnection to other data networks, and policy enforcement. UPF is also referred to as the data plane.

To meet the requirements for scale, throughput, latency, and reliability, 5G architecture has adopted Network Function Virtualization (NFV) and native cloud standards/technologies to streamline network and service deployment, operations, and management.

5G edge use cases

Leveraging 5G features like enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine Type Communications (mMTC), edge computing use cases broadly fall into five categories, as shown in Figure 1. These categories represent a subset of all Multi-access Edge Computing (MEC) applications.

Figure 1: 5G edge use case categories.

Let’s elaborate each of these categories:

  • Industry 4.0: This category involves gathering deep insights from distributed machinery and manufacturing processes and responding in real time, which, in turn, optimizes production lines and reduces waste.
  • Broadband Everywhere: This category involves the delivery of broadband to the wider public with high quality of service (QoS), based on one of the biggest 5G benefits of higher capacity and enhanced connectivity.
  • Connected Infrastructure: This category involves creating new connected experiences that pull and analyze data from distributed devices and sensors to improve individual experiences, enhance driver safety, and optimize transport.
  • User Experience: This category involves immersive user experiences and potential for peer-to-peer delivery of content, based on decreased latency and improved bandwidth. It is further aided by real-time feedback and user specific content.
  • Augmented Reality/Virtual Reality: This category involves AR/VR applications aided by the use of GPU (Graphics Processing Unit) accelerators in devices in industries like gaming, entertainment, healthcare, and retail.

5G edge computing topology

Given that 5G is closely related to telecom, a topology is best illustrated by a telco network topology with 5G and edge computing components, as depicted in Figure 2.

Figure 2: 5G telco network edge topology.

Some of the key components that make up the above topology are as follows:

  • Cloud: A public cloud or private cloud that acts as a repository for cloud native, container-based workloads. These clouds also host and run applications that are used to orchestrate and manage the different edge computing nodes.
  • Network edge: The network edge supports the deployed 5G network, including portions of the Virtual Radio Access Network (vRAN). The core network functions include 5G core, control plane, user plane, and location.
  • Edge cluster/gateway: The edge cluster/gateway supports the running of 5G edge network components and Multi-access Edge Computing (MEC) applications. The application may send/receive traffic to end users/devices directly from the access network. An application may be a provider and/or a consumer of MEC services.
  • Edge devices: Edge devices have compute and storage that can be utilized to run container-based applications, including on manufacturing robots in a factory floor, an ATM, an intelligent camera, or an automobile.
  • Sensors: Sensors, though not shown, are IoT-type devices with fixed functions.

As shown above in Figure 2, sensors and other far edge devices (as they are sometimes referred to) capture relevant information. Edge devices may also perform processing of data before sending it to the MEC, while sensors will transmit data as-is to the MEC. A 5G network will transmit the data through the radio heads and vRAN to the application running on the MEC. The application may also run on the core network or other backhaul components instead of the MEC, but such applications will have higher latency than those running on the MEC.

5G application layer

Previous blogs have described how a product like IBM Edge Application Manager (IEAM) can autonomously deploy workloads to remote edge nodes and can manage these workloads. This is done from a management hub cluster running Red Hat OpenShift Container Platform or other Kubernetes-based clusters. The IEAM management hub is designed specifically for edge node management to minimize deployment risks and to fully manage the service software lifecycle on edge nodes autonomously.

True 5G applications are latency sensitive and telco’s network edge Public/Private MEC enables new edge nodes for deployment. IEAM’s policy-based configuration function not only simplifies the placement of workloads, but does it autonomously and at scale.

With 5G and smart edge computing devices, we expect to see a surge in data at the edge, and data combined with AI can fuel innovation. The ability to harness the power of data and edge computing by leveraging real-time edge analytics is revolutionizing the digital landscape.

The IBM Cloud architecture center offers up many hybrid and multicloud reference architectures, including AI frameworks. Look for the edge computing reference architecture and related articles.

This blog introduced telecom edge and showed how 5G and edge technologies are inextricably linked. We shared our insights on 5G and provided examples of emerging 5G edge use cases. We hope this article sparks new thinking and innovation around the power of 5G and edge can bring.

Thanks to Jason Gonzalez for reviewing the article. Please make sure to check out all the installments in this series of blog posts on edge computing:

Learn more

Was this article helpful?
YesNo

More from Cloud

Fortressing the digital frontier: A comprehensive look at IBM Cloud network security services

6 min read - The cloud revolution has fundamentally transformed how businesses operate. Its superior scalability, agility and cost-effectiveness have made it the go-to platform for organizations of all sizes. However, this shift to the cloud has introduced a new landscape of ever-evolving security threats. Data breaches and cyberattacks continue to hit organizations, making robust cloud network security an absolute necessity. IBM®, a titan in the tech industry, recognizes this critical need, provides a comprehensive suite of tools and offers unmatched expertise to fortify…

How well do you know your hypervisor and firmware?

6 min read - IBM Cloud® Virtual Private Cloud (VPC) is designed for secured cloud computing, and several features of our platform planning, development and operations help ensure that design. However, because security in the cloud is typically a shared responsibility between the cloud service provider and the customer, it’s essential for you to fully understand the layers of security that your workloads run on here with us. That’s why here, we detail a few key security components of IBM Cloud VPC that aim…

New IBM study: How business leaders can harness the power of gen AI to drive sustainable IT transformation

3 min read - As organizations strive to balance productivity, innovation and environmental responsibility, the need for sustainable IT practices is even more pressing. A new global study from the IBM Institute for Business Value reveals that emerging technologies, particularly generative AI, can play a pivotal role in advancing sustainable IT initiatives. However, successful transformation of IT systems demands a strategic and enterprise-wide approach to sustainability. The power of generative AI in sustainable IT Generative AI is creating new opportunities to transform IT operations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters