171
171
Edge Computing
in Action
Multi-Access
Edge Computing
in Action
Dario Sabella
Alex Reznik
Rui Frazao
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources.
Reasonable efforts have been made to publish reliable data and information, but the
author and publisher cannot assume responsibility for the validity of all materials or the
consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if
permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
r eproduced, transmitted, or utilized in any form by any electronic, mechanical, or other
means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance
Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a
not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of
payment has been arranged.
Fo re wo rd xi
Acknowledgments xiii
Authors xv
Introduction xix
C h ap t e r 2 I n t r o d u c i n g MEC : E d g e C o m p u t i n g in
v
vi C o n t en t s
C h ap t e r 3 Th e Th r e e D i m e n s i o n s of MEC 45
3.1 e Infrastructure Dimension
Th 46
3.1.1 Enabling MEC in 4G Networks 48
3.1.1.1 Bump in the Wire 48
3.1.1.2 Distributed SGW with Local
Breakout 50
3.1.1.3 Distributed S/PGW 51
3.1.1.4 Distributed ePC 52
3.1.2 MEC in 5G Networks 53
3.2 The Operations Dimension 55
3.3 The Commercial Dimension 64
C h ap t e r 4 MEC a n d t h e P at h t o wa r d 5 G 69
4.1 etwork Evolution toward 5G
N 69
4.1.1 Network Performance Drivers for 5G Systems72
4.1.2 The Importance of New Devices for
5G Systems73
4.1.3 Spectrum Evolutions toward 5G Systems 75
4.2 The Need for the “Edge” 77
4.2.1 Key Drivers for MEC in 5G 77
4.3 Exemplary Use Cases for MEC 78
4.3.1 Consumer-Oriented Services 79
4.3.2 Operator and Third-Party Services 80
4.3.3 Network Performance and QoE Improvements 80
4.4 Edge Computing: 5G Standards and Industry Groups 81
4.4.1 3GPP Standardization Status 81
4.4.2 Industry Groups 83
4.4.3 The Role of ETSI MEC in 5G 85
4.5 MEC and Network Slicing 86
Annex 4.A – IMT2020 Systems: Minimum Technical
Performance Requirements 88
Notes89
C o n t en t s vii
C h ap t e r 6 Th e MEC M a r k e t : Th e V e n d o r ’ s
Perspective 111
6.1 MEC Opportunity for Vendors 111
6.2 W ho Are the Potential MEC Vendors? 112
6.3 Revenue and Cost Benefits of MEC 115
6.4 W hat Are the Main Challenges for Vendors? 118
6.4.1 Building Decentralized Data Centers at
the Edge of the Mobile Network118
6.4.2 Protecting and Securing MEC 118
6.4.2.1 Compromised Protocols 119
6.4.2.2 Man-in-the-Middle Attacks 119
6.4.2.3 Loss of Policy Enforcement 119
6.4.2.4 Loss of Data 120
6.4.3 Developing a Cooperative and Healthy
Ecosystem120
6.5 Hold on … What If the Opportunity Goes
beyond Telcos?120
6.5.1 W hat Are Private LTE Networks? 121
6.5.2 Is MEC Being Considered for Private
LTE Networks?122
6.5.3 W hat Is the Opportunity for MEC Vendors? 122
Notes123
C h ap t e r 7 Th e MEC M a r k e t : Th e O v e r -t h e -To p
P l ay e r ’ s P e r s p e c t i v e 125
7.1 e OTT Approach to the Edge
Th 125
7.2 Edge Hosting/Co-Location 127
7.3 X aaS 128
viii C o n t en t s
C h ap t e r 8 Th e MEC M a r k e t : Th e N e w V e r t i c a l s ’
Perspective 131
8.1 N
ew Players in the 5G Equation 131
8.1.1 The Role of Verticals in 5G Systems 133
8.1.2 O verview of Vertical Segments and
Their Impact133
8.1.2.1 Smart Transportation 134
8.1.2.2 Smart Manufacturing 135
8.1.2.3 Entertainment and Multimedia 136
8.1.2.4 eHealth 137
8.1.2.5 Smart Cities 138
8.2 B
enefits of MEC: A Vertical’s Perspective 138
8.2.1 Performance Improvement 139
8.2.2 Unlock from Operators 139
8.2.3 MEC as Enabler of IT Interoperability in 5G 142
8.3 5G Verticals: Business Aspects 142
8.3.1 Cost Aspects 146
8.4 Case Study: The Automotive Sector 147
8.4.1 V2X Technology Landscape 148
8.4.2 Benefits of MEC for 5G Automotive Services 149
8.4.3 MEC Use Cases for 5G Automotive Services 151
Notes151
C h ap t e r 10 Th e MEC E c o s y s t e m 175
10.1 MEC: A Heterogeneous Ecosystem of Stakeholders 175
10.1.1 Operators and Service Providers 177
10.1.2 Telco Infrastructure Providers 180
10.1.3 IT Infrastructure Providers 180
10.1.4 Verticals and System Integrators 181
10.1.5 Software Developers 182
10.2 Ecosystem Engagement in ETSI ISG MEC 184
10.2.1 MEC Proof of Concepts 185
10.2.2 MEC Hackathons 185
10.2.3 MEC Deployment Trials 186
10.2.4 MEC DECODE Working Group 186
10.3 Industry Groups 187
10.4 Open Source Projects 187
10.4.1 A kraino Edge Stack 188
10.4.1 OpenStack Foundation Edge
Computing Group188
10.5 Research Communities 189
Notes191
References 193
Index 201
Foreword
xi
x ii F o re w o rd
Five years on, much of that vision has become or is nearing reality.
MEC trials are commonplace and commercial offerings exist. MEC
is included in proposed solutions for 5G, factory automation, smart
cities, and intelligent transport system use cases, to name just a few.
Other standardization bodies and forums such as 3GPP, OpenFog
Consortium, and the Open Edge Computing initiative are broadening
the MEC footprint to such an extent that it has become mainstream.
This book provides the readers with a unique opportunity to learn
about and assimilate the technical, deployment, market, ecosystem,
and industry aspects of MEC, all in one place. Its authors are lead-
ers in the field, and they have made key contributions in all of those
areas through further specific ETSI White Papers and presentations
at numerous industry-wide events.
Dr Adrian Neal
Senior Manager, Industry Standards
Vodafone Group Services Ltd.
Acknowledgments
x iii
Authors
xv
xvi Au t h o rs
Rui Frazao is the CTO and EVP of EMEA Operations at B-Yond.
Prior to B-Yond, Rui was CTO of Vasona Networks, an innovative
provider of multi-access edge computing (MEC) solutions, acquired
by ZephyrTel (2018). He also previously held various group technol-
ogy positions during his 15 years at Vodafone including serving as the
Au t h o rs x vii
xix
xx In t r o d u c ti o n
Note
1 w w w.etsi.org/images/f iles/ETSIWhitePapers/etsi_wp24_MEC_
deployment_in_4G_5G_FINAL.pdf
Part 1
MEC and the
N e t work
1
From C loud C omputin g
to M ulti -A cces s
E d g e C omputin g
3
4 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
A proper place to start seems to be the question of why one even needs
edge computing in general and MEC in particular. Much has been
written on the subject, but it can be summarized as follows: there are
applications for which the traditional cloud-based application hosting
environment simply does not work. This can happen for a number of
reasons, and some of the more common of these are:
• The application is latency sensitive (or has latency-sensitive
components) and therefore cannot sustain the latency associ-
ated with hosting in the traditional cloud.
• Application clients generate significant data which requires
processing, and it is not economical, or, perhaps even not
feasible to push all this data into the cloud.
• There are requirements to retain data locally, for example,
within the enterprise network.
A big driver for edge computing is the IoT, where edge computing
is commonly referred to as fog computing. NIST (National Institute
of Standards and Technology), in its “Fog Computing: Conceptual
Model” report [8], makes the following statement:
Recall, a page or two back, we noted that the primary letter in the
“MEC” abbreviation is the last one – “C” denoting “computing”,
but really denoting “cloud.” And so, we begin by looking at the
cloud computing aspects of MEC. The Wikipedia page on “Cloud
Computing”1 defines it as follows.
There are important reasons why edge computing is now moving into the
forefront of the conversation both in cloud computing and in Telco – and
10 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Internet
ISP
Backbone
ISP Network B
CDN edge server
Network A
“Mobile”
Edge CDN
Edge CDN
(Traditional)
MME
E
MM
S1-
S11
LTE RAN S1-U SGW S5/S8 PGW SGi Public Data Network
(e.g. the Internet)
Figure 1.2 Highly simplified 4G core network showing Edge CDN locations.
12 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
The need to have an “Edge CDN” node “on the S1,” as well as the
potential to offer other services there, led to the development of both
a standards-defined architecture (LIPA) and a “transparent” local
breakout approach, in which the tunnels on the S1 are broken. Both
approaches were the subject of active development and productization
in the mid-2000s and, anticipating MEC, were used for applications
much broader than just “edge data caching.” See Ref. [3] for an exam-
ple that is completely different from edge caching as well as for a good
discussion of how locating processing “on the S1” works. It should be
noted here that in the 5G architecture, as currently being defined by
3GPP, placement of an application function next to the RAN will be
supported natively via a properly located user-plane function (UPF).
We shall discuss this in more detail further ahead.
Returning, however, to the traditional Edge CDN, we note that
its location at the far edge of the CSP network was dictated by an
additional factor – how these entities work. At least in part they use
sophisticated algorithms to analyze user population statistics and con-
tent request statistics, and attempt to predict which content is likely
to be requested by which user populations. This only works if the user
and content population statistics are sufficiently large and if the stor-
age at the “edge” sites is also sufficiently large to hold a significant
amount of content. Moving the Edge CDN closer to the user also
reduces the size (and thus, statistical sample) of the user population
served at any given time as well as the amount of content (again statis-
tical sample) that passes the caching point. This could be counteracted
by increasing the size of the cache; unfortunately, the economics of
moving to the edge dictate the exact opposite – the amount of storage
has to be reduced. Thus, a traditional approach to edge caching would
not work much closer than the edge of the CSP network.
The way out of this is to take advantage of the rich context which
being at the very far edge offers. For example, a very small cell serving
a coffee shop is highly contextualized – its user population is highly
likely to be into coffee and have a particular profile associated with
that coffee shop. If that context can be exposed to the application, the
application might just know what to do about it. If it is then provided
a landing zone for its content at the small cell, it might well know
what to do with this storage. This idea was recognized by the Small
Cells community; the work of the Small Cells Forum in this area is
F R O M C L O UD C O M P U TIN G T O M EC 13
Policy- WLAN
Based Firewall Controller
Router
WiFi
Virtualization Infrastructure
WAN
uCPE (MPLS, MetroEth., etc.)
Mesosphere, OpenStack, etc.4 Each one of these comes with its own
approach to management services, which means, its own APIs, which
the configuration, management and assurance scripts and services will
have to utilize. However, this is not a problem; after all, the develop-
ment team is going to pick just one, maybe two. Chances are the team
is already familiar with the environment, but even if it’s completely
new, after some learning curve, you are up and running. Moreover, if
you go with a widely used platform, there are plenty of good tools out
there to help, both in the Open Source and in commercial SW space.
Let’s translate this experience to MEC, keeping in mind that
MEC is about the CSP provider’s edge cloud – that is, the CSP
becomes a cloud provider. Just for simplicity, let’s restrict our atten-
tion to the United States. At the time of writing of this book, the
United States has four major mobile carriers: Verizon, AT&T, Sprint,
and T-Mobile. It also has several major independent broadband/cable
providers: Comcast, Spectrum, Time Warner, and CenturyLink.
With MEC, each one of these becomes an edge cloud provider, which
appears to be similar to the AWS, Azure, Kubernetes, OpenStack,
etc. ecosystem listed earlier, except for one critical point: you can’t just
select one or two. As an application developer, you have to be able to work
with all of these.
The reasons become apparent if you think about your users: they
have to be able to reach your cloud instances. However, while it is
reasonable to expect that most of your users are able to reach AWS
most of the time and also are able to reach your private cloud running
OpenStack all the time, it is not reasonable to expect that customers
of Operator 1 (Op1) are able to reach Operator 2’s (Op2) edge cloud.
And even if they are, Op2’s edge cloud is NOT an edge cloud for
Op1 customers. To reach it, their communication has to “leave” Op1’s
network, traverse the Internet, and then enter Op2’s cloud. By this
point, any edge benefits (proximity, low latency, minimization of net-
work BW, etc.) are lost – in fact, the Op1 customers would be better
off accessing a public cloud–hosted instance. We have illustrated this
in Figure 1.4.
This creates a need for the application developers to be able to work
with most of the CSPs in any geography where the application needs
to be able to be present at the edge. However, for all but the largest
application developers, such scaling is simply not feasible – and even
F R O M C L O UD C O M P U TIN G T O M EC 21
Op1
Op2
Figure 1.4 Illustrating paths to public and another operator’s edge clouds.
the world manage tens of large clouds, not thousands of small ones.
In many cases, these clouds will run workloads from entities that do
not trust each other – in the formal definition of “trust,” with some of
these entities running SW applications that constitute critical, real-
time regulated infrastructure – and others running stuff like games.
How does that work? There are some potential answers, but no “best
practices” – since there have been no “practices” at scale to select some
“best” ones.
When these clouds do form components of critical infrastructure –
or maybe just “important” infrastructure – how do they fail? What
do we need to do to localize failures? Recall that IoT is a major
use case for edge computing, which means edge computing will
be pervasive in our lives. As many recent examples show, complex
systems fail in complex ways that we do not understand and do so
catastrophically more often than we think (see, e.g., Nicholas Taleb’s
discussion in books such as Antifragile [13]). Massively distributed
computing makes these systems much more complex. If any of you,
our readers, are looking for a challenging and impactful Ph.D. topic,
this must be it.
Beyond failures, we also need to look at security – but more than
just traditional cloud security. While we worry about access to our
data in the “cloud” in the cyber-sense, that is, someone gaining
access through user credentials theft, obtaining admin access into the
management system, etc., with edge computing, we also need to worry
about the physical access – quite literally, an unauthorized access to
one of the many cloud sites. Prevention – while critical – can only go
so far. With such a scale and most sites located in intrinsically less
secure locations than a cloud provider’s data center, this will happen.
How can this be detected, how is sensitive data protected, and what
are the recovery mechanisms?
At the same time, edge computing can be a tremendous asset in
a security system. For example, Anycast IP routing is well known to
be an effective mitigation strategy against Denial-of-Service (DoS)
attacks – particularly, distributed DoS attacks. However, the effec-
tiveness of Anycast-based DDoS mitigation depends on there being a
highly distributed infrastructure – not just at the end points (presum-
ably, a cloud provider can provide many end points on many com-
pute nodes in a data center), but along the path to the end points as
F R O M C L O UD C O M P U TIN G T O M EC 25
well. This is hard for physical reasons – eventually, the traffic must
converge on one or a few physical sites where the cloud is. Not so
with edge computing – the inherent scale and physical distribution
of a large MEC network is a natural fit to an Anycast-based DDoS
defense.
Then, there is the challenge of writing applications that take
advantage of the edge. We know they should probably rely on
RESTful microservices, but really not much more. From very practi-
cal approaches (see, e.g., Ref. [12]) to fundamental questions of the
underlying power of distributed computation [14] (i.e., whether and
how it can fully realize everything that a Turing machine can), the
challenge of distributed cloud computing has not yet received exten-
sive study – although the extensive existing work on distributed
computing is bound to be relevant and perhaps the edge is where
networking/computing paradigms such as ICN will find their true
application. It is not an accident that Amazon named its serverless
compute “Lambda functions” and that it is precisely “Lambda func-
tions” that AWS Greengrass enables at the edge today.
The societal impact of the edge is not understood at all. From such
mundane topics as business cases and strategies – which we shall
address in some more details – to deeper issues of how pervasive edge
cloud could impact society, very little has been studied and under-
stood. However, it is clear that by putting flexible general-purpose
computing at the edge and enabling the appropriate communication
and management with it, MEC can have significant impact. From
bringing cloud to the underserved areas of the world, to initiatives
such as Sigfox’s “Seconds to Save Lives” (https://sigfoxfoundation.
org/seismic-alert/), MEC – often combined with IoT – can reshape
our lives in ways that we cannot imagine today.
This brings us to the last point of this discussion – while some uses of
MEC are going to happen because the society needs them, most need
to be driven by solid business consideration. In short, all parties need
to understand how they are going to make money. This is especially
true because MEC needs to be huge so as to deliver on its promise.
A dozen MEC sites in a downtown of a city is a pilot deployment, not
a commercially viable enterprise. Such scale demands a huge amount
of investment – and huge investment is unlikely to happen without
an understanding of how a return on such investment is made. And
26 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
even these business aspects of MEC are now well understood today,
something which we will also explore in more depth further in this
book.
Notes
1 https://en.wikipedia.org/wiki/Cloud_computing
2 Refer to, e.g., Refs. [1,2] for an excellent background on 4G networks.
3 This is the clear and commonly understood goal, even if the solutions
presently offered are somewhat short of it.
4 Our mixing of VM (Virtual Machine) and container-based environ-
ments is intentional – for this discussion, it doesn’t matter.
2
I ntroducin g MEC
Edge Computing in the Network
So, what is MEC really? What does it look like and how does it really
work? In our introductory discussion, we argued that it is a bit more
than just parking and a bit of compute and storage somewhere next
to a network and plugging them into the same Ethernet switch. It’s
time now to dive a bit deeper into what MEC really is. We start with
the ETSI MEC Reference Framework and Reference Architecture,
defined in Ref. [15].
The Reference Framework, shown in Figure 2.1, is an excellent
place to start as it shows the essential components that make up a
generic MEC system. We note here that the referenced document,
being a rev. 1 document, uses “Mobile Edge ….” Terminology for
MEC. Updated versions of the specifications are expected to switch
to the more generic “Multi-access Edge…” terminology. To avoid
confusion, we will simply use the abbreviation “ME,” which can refer
to both.
Starting at the bottom, we note the “Networks” level, in which
ETSI defines three types of networks:
• 3GPP network. This is any type of access network defined
by 3GPP. Its highlight is due to a number of factors, includ-
ing the relative importance of 3GPP-defined networks in the
27
28 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Although all ETSI MEC specifications are defined with the intent
of enabling a self-contained MEC cloud that is able to exist in dif-
ferent cloud environments, the dominance of NFV in the Telco space
makes it extremely important to make sure that the MEC-compliant
system can be deployed and can function in an NFV-based system. To
ensure this, ETSI MEC conducted a study on the coexistence of ETSI
MEC and ETSI NFV, the result of which is available as a GR MEC
017 [32]. The study did identify a number of small issues, for which
36 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
resolutions are being developed in ETSI MEC and ETSI NFV at the
time of publication of this book. More importantly, however, the study
did conclude and illustrate that the overall integration approach should
be straightforward and workable even without all the identified issues
being fully resolved. This approach is summarized as follows:
• Both the MEP and ME applications are VNFs.
• The MEPM acts as an NFV element manager (EM) for the
MEP and for any applications that do not have their own
EM.
• NFV management aspects are provided by an ETSI NFV–
compliant VNFM. Notably, in practical implementation,
many MEP/MEPM vendors choose to include VNFM func-
tionality capability in MEPM, should this be needed.
• The MEP VNF needs to be instantiated first in every MEC
host. As such, NFVO needs to be aware of this requirement.
• The application descriptor package (AppD), as defined in
MEC 10-2 [30], is an extension to a VNFD, which is then
made available to the EM (i.e., MEPM) for those applications.
Figure 2.3 Illustration of a system implementing the video analysis service scenario.
(Figure 2 [34].)
Because faces are often small components of the overall video stream,
this system is still able to reduce the overall upstream data require-
ments by one to two orders of magnitude – a huge improvement in
the overall system load. Yet, because we allow for high false-alarm
probability (letting a more sophisticated final processing step correct
our errors), the preprocessing step can be relatively simple and with a
low computational footprint. Notably, this type of a solution is already
being put into practice by the industry; see, for example, Ref. [35].
2.4.3 Augmented Reality
Our first two service scenarios are about managing the transmission
of data between a client device and a cloud application. However, in
some cases, the application itself should be local because pretty much
everything it does is hyper-local. Excellent examples of this are the
various augmented reality applications. For example, a smart museum
augmented reality application may provide additional information
when a smart phone or a viewing device (smart glasses) is pointed at a
museum object, or a smart hard hat may project key information such
as wiring diagrams onto components for field technicians (inspired by
the Guardhat© concept: www.guardhat.com/). In all of these cases,
most of the data is hyper-local – it is only relevant in the very vicinity
of the physical object – the physical reality is “augmenting.” As such,
placing the processing and delivery of such data locally makes sense
all around – from end-user QoE perspective, network performance
perspective, and even system design perspective.
From the three service scenarios mentioned earlier, one can get
the impression that MEC is all about video. In fact, it is true that
various operations on video are an important area of application for
MEC. This is because video is often a rather extreme example of a
triple threat – it needs high bandwidth requirements and low latency
requirements (when real-time is involved as in some AR applications),
and is streaming, which means it is very sensitive to jitter. Finally,
as we noted, there is often a real present need for video-processing
support at the edge. Nevertheless, video is still just an instance of a
40 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
broader class of use cases and applications where edge presence and
MEC capabilities are going to be necessary. Our next service scenario
is one such case.
Consider a client device that needs to perform a complex computa-
tion that it simply does not have the computing capacity to perform.
Or perhaps it does, but the battery power spent on this is prohibitive.
The modern solution to this approach is to offload such a computation
to the cloud, but what if one couldn’t do so! Often, the rationale for
even attempting computation on a client device is that offloading to
the cloud is not feasible – because of latency, throughput, or some
other constraint (e.g., the data needs to be kept within the boundaries
of an enterprise).
By placing a pool of cloud-like compute resources very near to the
client device, edge computing presents a solution to this problem.
True, the computational capabilities of an edge cloud are likely to be
far below those of the “deep cloud.” Still, it is likely that edge clouds
will be built with true cloud-grade compute nodes (i.e., real servers)
and that these will be pooled. The capabilities of most edge clouds are
likely to far exceed those of any client device. And so, the edge is quite
literally “right there” to perform some of the heavy computational
lifting. Alternately, a well-designed application will take an even
more intelligent approach, identifying those computations that must
stay at the edge and pushing only those into the edge cloud, while
continuing to do the rest in the deep cloud.
2.4.6 Connected Vehicles
area (often called V2X) is likely to become just as, if not more per-
vasive. Moreover, because of the integration of physical and digital
worlds, public and private domains, and critical infrastructure, the
challenges are immense.
At the time of writing, ETSI MEC is well underway toward
addressing these challenges, having produced a detailed study of
impacts of V2X on MEC [38] and initiated the required standardiza-
tion activities.
2.4.7 IoT Gateway
The final service scenario listed in MEC-IEG 004 is the IoT Gateway.
An IoT Gateway is a key function – usually realized in a stand-alone
device – in the exploding domain of low-power IoT sensors and actu-
ators. Essentially, it is the first “point of contact” for these devices
with the rest of the world. Depending on the specific use case and
the nature of the actual IoT devices, it may serve any number of pur-
poses, including communication aggregation, computational offload,
identity proxy, etc. As such, the physical realization of such a device is
typically a generic compute node, integrated into an access network.
This makes it an MEC Host.
45
46 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Access Network
MEC Cloud
Figure 3.1 Attaching an MEC cloud to an access network – the simplest case.
T he T h ree Dim ensi o ns o f MEC 47
Access Network
3.1.1.1 Bump in the Wire Let us start with the BiW approach. An
architecture diagram depicting this approach is shown in Figure 3.3.
A major challenge here, as the name suggests, is that this approach
requires the MEP to “bump,” that is, to intercept the S1 interface in
the 3GPP network. This interface carries GTP-bearer traffic, usually
encrypted using IPSec. As such, it requires the MEP to institute an
“authorized man-in-the-middle attack” on these bearers. Fortunately,
techniques for doing so have been well-known for some time, usually
under the name of “Local Breakout.” To achieve this, the MEP needs
to have access to security information (e.g., bearer key matter), as well
as the ability to read and, if needed, modify control signaling on the
S1-C (the control portion of the S1 interfaces). This is achieved using
appropriate interactions with the core network’s MME, PCRF, and
T he T h ree Dim ensi o ns o f MEC 49
3.1.1.3 Distributed S/PGW The next solution moves the MEC point
to the outside of the PGW, as shown in Figure 3.5.
In this approach, all of the user plane functions (UPFs) of the ePC
have been brought into the edge site and the MEC cloud is located
behind the PGW. This brings a number of benefits. First, it is s imple –
from the point of view of MEC, this has the feel of a non-mobile
deployment, Figure 3.2, with the MEC cloud operating on routable
IP traffic. It also requires no implementations within the 3GPP domain
that go beyond the scope of the 4G standards. Thus, conceptually, it
is simpler.
However, this approach also comes with a number of limitations.
First, a PGW is often associated with an APN. Here, the mobile
operator must decide how this should be handled. The number of
edge sites in a typical network is likely to be in the hundreds, if not
thousands. An APN per site may or may not make sense. However,
a single APN for all edge sites may not make sense as well. Thus,
APN design (something that was probably never an issue before) may
become a challenge in this case. A related complication is mobility –
UEs attached to edge site PGWs cannot be mobile – inter-PGW
mobility is not supported.
3.1.2 MEC in 5G Networks
N2 N4
UE (R)AN 1 UPF 1 DN
1
Think of the edge cloud that a CSP has deployed next to its access
network, and in fact, let’s imagine that this is a modern (5G or rather
advanced 4G) network. Moreover, let’s suppose that the CSP wants
to utilize this edge cloud for the following purposes.
• Its own network services that need to run in the edge in order
for the CSP to achieve the desired system performance. These
may include:
• Virtualized/Cloud RAN (vRAN or cRAN), which may
require to operate either on bare metal or using specialized
real-time–enabled virtual infrastructure.
• Other virtualized network functions (VNFs), for example,
a virtual 5G UPF, which, while running on a standard
VIM, requires to be managed within an network function
virtualization (NFV) framework.
• Third-party (revenue generating) applications, which may
also come in different flavors, for example:
• Applications virtualized using a traditional VM-based
approach and expecting a traditional virtualization infra-
structure, for example, OpenStack or VMware.
• Applications enabled using a collection of containerized
microservices and managed by Kubernetes.
Clearly, the CSP faces a challenge. It can try and manage every-
thing under a single VIM, for example with OpenStack. In this
T he T h ree Dim ensi o ns o f MEC 57
case, the vRAN bare metal resources would be managed via Ironic,
VM-based third-party applications would be managed as part of
the NFV domain and containerized application would be confined
to a single (presumably) large domain with Kubernetes managing
resources just within this VM. While theoretically possible, such an
architectural decision does come with a number of limitations. For
example, limitations of Ironic; the fact that third-party applications
are not VNF and are not designed to be, thus potentially leaving
the CSP with the task of onboarding them into an NFV environ-
ment; performance issues associated with running containers within
a VM; security and reliability implications of mixing network func-
tions and third-party applications; etc. Whether or not the benefits
outweigh the complexities is a subject for a separate discussion –
our point for now is that while in some cases such a single-IaaS
domain architecture works, in many cases, it may not make sense.
The issue becomes even more complex if one starts thinking about
supporting multiple (and c ompeting) cloud service providers such as
Amazon Web Services (AWS), Azure, and Google Cloud Platform,
within a single edge site. The point is this – as a CSPs edge cloud
evolves, there is significant likelihood that support for multiple
XaaS domains will be required. The resulting management sys-
tem architecture is illustrated in Figure 3.8, which shows a system
with K MEC sites supporting as many as N different XaaS domains
per site. As shown in Figure 3.8, from a CSPs point of view, this
requires the presence of some kind of local sites orchestrations unit
that is connected to a centralized site orchestration entity located
in the CSP’s private cloud. Depending on how the CSP offers the
edge site infrastructure to its tenants, the local/centralized O&M
may vary. For example, if the CSP offers the infrastructure as a bare
metal level, then the local site O&M could be just the out-of-band
infrastructure management units (e.g., HPE’s iLO, Dell’s Remote
Access Controller) or a federation of these, with the centralized
O&M being an aggregated management solution for physical infra-
structure. As another example, if the edge infrastructure is being
offered as NFV-based virtual IaaS, then the edge O&M becomes
a combination of ETSI NFV VNFM and ETSI MEC MEPM,
while the centralized O&M should include the functions of ETSI
NFV NFVO and ETSI MEC MEAO.
58 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
CSP private
Local site
O&M
Local site
O&M
Figure 3.8 also shows the presence of XaaS domain O&M for each
of the XaaS domains – these may be located in a private cloud of
the XaaS domain tenant or in the public cloud. Some examples for
illustration purposes are as follows: if the XaaS domain is Azure IoT
Edge, then Microsoft’s IoT edge management system is the O&M for
this domain; if the XaaS domain is the CSP’s NFV domain, then the
ETSI NFV NFVO, ETSI MEC MEAO, Services Orchestration,
etc. are the O&M for that domain.
At this point, the architecture presented in Figure 3.8 should raise
some questions and concerns. Among these are the complexities asso-
ciated with multi-domain O&M, especially making all of this work at
scale and across multiple industry players; the potential need to coor-
dinate between domain O&M systems and MEC O&M as well as
potential for overlap between these – as evoked by the fact that ETSI
NFV NFVO and ETSI MEC MEAO appeared in our examples as
both an MEC O&M component and a domain O&M component;
and the absence of FCAPS data collection and analytics in Figure 3.8
and in our discussion.
T he T h ree Dim ensi o ns o f MEC 59
CSP Private
Microsoft Azure
CSP private
OpenStack
“local”
OpenStack
“local”
Figure 3.9 O&M example with NFV and Azure IoT edge outside NFV.
60 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Microsoft Azure
Azure O&M
CSP private
MEPM/
VNFM
MEPM/
VNFM
Figure 3.10 O&M example with NFV and Azure IoT edge within NFV.
62 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
disappears – it is not needed and the “MEC O&M” can handle that
task. This illustrates another important point – in many cases, domain
O&M may not be necessary and the overall system is significantly
simplified.
What about the ability to scale the number of sites to hundreds or
thousands or even higher? This is addressed by making sure that the
interface between the “local site O&M” and “MEC O&M” is well-
defined and satisfies certain requirements:
• Stateless: scaling stateless instances is significantly easier
than scaling stateful ones; additionally, it makes the overall
approach robust to communication session issues.
• Loose latency requirements: recall that WAN connectivity
may carry high latency.
• Robust to communication session interruptions.
• Built-in and robust identity, naming, site and capability dis-
covery, authentication, etc. system: so that the management of
site identities, names, security, is taken care of.
In this respect, a standard approach to REST (i.e., REST over
HTTP) represents an excellent fit. It is stateless by design and the
HTTP transport is by default latency-insensitive and supports strong
security (via HTTPS). It is descriptive, making site and capability
discovery straightforward, and a number of well-known and robust
tools can be brought to bear to support this function as well as authen-
tication and other capabilities. These include the use of URIs for nam-
ing of resources – which can be sites as well as their capabilities; DNS
for URI resolution (and thus site discovery in a network); OAuth for
authentication and related functionality, etc.
It is notable that the majority of API solutions in this space are
adopting REST as either the only or the default/preferred solution –
this includes ETSI NFV and MEC, Redfish, and Azure Stack APIs.
Well-defined RESTful APIs, in turn, allow modern O&M tooling
to be defined, and although the industry is in an early stage, solutions
for MEC O&M are emerging.
Lastly, let us turn to the absence of FCAPS support in Figure 3.8.
This is left out mainly for clarity; otherwise, the diagram would be
rather busy. The reader should assume the presence of data collection
for FCAPS at all key points of the system. A more complex question
T he T h ree Dim ensi o ns o f MEC 63
B2B2x
OPEX optimization
Low
Low High
Short -Term Returns
The typical increase of data traffic demand that we all have been wit-
nessing in these years is a consolidated trend that seems to continue
also in the future. Many studies [45–48] are in fact confirming this
trend, and often are updating older forecasts, as they were considered
too conservative, since new estimations are instead projecting toward
higher data volumes and traffic needs. Figure 4.1 shows that mobile
data traffic will increase sevenfold between 2016 and 2021 globally,
at a compound annual growth rate (CAGR) of 47%, with annual
traffic exceeding half a zettabyte in 2021. As an additional remark,
the mobile devices usage (both via cellular and Wi-Fi networks) will
account for 47% of total IP traffic by 2020, a testament to the sig-
nificant growth and impact of mobile devices and lifestyles on overall
traffic, while fixed traffic will fall from 52% of total IP traffic in 2015
to 33% by 2020 [46]. For this reason, the evolution of mobile network
is critical for the growth of the overall IP traffic.
69
70 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
60
40
30
20
10
0
2015 2016 2017 2018 2019 2020 2021 2022
Year
Figure 4.1 Growth of global mobile data traffic. (Elaboration from Ref. [46].)
New
terminals and
devices
Network
New services
evolution
Data traffic
demand
1011010010011101...
Figure 4.3 Global mobile devices (excluding M2M) by 2G, 3G, and 4G. (Source: [46].)
72 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
PARAMETERS 1G 2G 3G 4G
Introduced in 1980s 1993 2001 2009
year
Technology AMPS, NMT, TACS IS-95, GSM IMT2000, WCDMA LTE, WiMAX
Multiple FDMA TDMA, CDMA CDMA CDMA
access
Speed (data 2.4–14.4 Kbps 14.4 Kbps 3.1 Mbps 100 Mbps
rates)
Bandwidth Analog 25 MHz 25 MHz 100 MHz
Applications Voice calls Voice calls, Video conferencing, High-speed
SMS, browsing mobile TV, GPS applications,
(partial) mobile TV,
wearable devices
devices in the market often acts as a catalyzer for new services. This
phenomenon is particularly true, if we think about the beginning of
the smartphone era, characterized by the introduction of a new gen-
eration of devices, more capable and with bigger displays, but above all
more usable, trendy, and appealing for the end user (and often also very
expensive, compared to the previous generation of phones). The huge
sales volumes (matching the interest of a consolidated customer base)
generated a high number of connections and stimulated the actual usage
of 4G systems. Furthermore, we can also say that the advent of smart-
phones stimulated the proliferation of an ecosystem of applications, fed
by a growing community of developers, introducing a multitude of new
services for end users. (Note: here, a careful reader may notice that 4G
networks were not specifically designed for these services, which arrived
later, and were instead driven by the advent of smartphones.)
Thus, we can essentially say that the beginning of the 4G success
(in terms of global revenues, justifying all 4G investments after the 3G
deployment) was also determined by the introduction of smartphones.
Currently, for 5G systems, many experts are agreeing to consider ver-
tical market segments (like automotive, industry 4.0, smart cities, …)
MEC a n d t he Pat h t o wa rd 5 G 75
1 5G needs a significant amount of new harmonized mobile spectrum. Regulators should aim
to make available 80–100 MHz of contiguous spectrum per operator in prime 5G
mid-bands (e.g., 3.5 GHz) and around 1 GHz per operator in millimeter wave bands (i.e.,
above 24 GHz).
2 5G needs spectrum within three key frequency ranges to deliver widespread coverage and
support all use cases. The three ranges are: Sub-1 GHz, 1–6 GHz, and above 6 GHz.
• Sub-1 GHz will support widespread coverage across urban, suburban, and rural areas
and help support Internet of Things (IoT) services
• 1–6 GHz offers a good mixture of coverage and capacity benefits. This includes
spectrum within the 3.3–3.8 GHz range, which is expected to form the basis of many
initial 5G services
• Above 6 GHz is needed to meet the ultrahigh broadband speeds envisioned for 5G. Currently,
the 26 GHz and/or 28 GHz bands have the most international support in this range.
3 The ITU World Radiocommunication Conference in 2019 (WRC-19) will be vital to realize the
ultrahigh-speed vision for 5G, and government backing for the mobile industry is needed
during the whole process.
4 Exclusively licensed spectrum should remain the core 5G spectrum management approach.
Spectrum sharing and unlicensed bands can play a complementary role.
5 Setting spectrum aside for verticals in priority 5G bands could jeopardize the success of
public 5G services and may waste spectrum. Sharing approaches like leasing are better
options where verticals require access to spectrum.
6 Governments and regulators should avoid inflating 5G spectrum prices (e.g., through
excessive reserve prices or annual fees) as they risk limiting network investment and
driving up the cost of services.
7 Regulators must consult 5G stakeholders to ensure that spectrum awards and licensing
approaches consider technical and commercial deployment plans.
8 Governments and regulators need to adopt national spectrum policy measures to encourage
long-term heavy investments in 5G networks (e.g., long-term licenses, clear renewal
process, spectrum roadmap).
4.3.1 Consumer-Oriented Services
These are innovative services that generally benefit directly the end
user, that is, the user using the UE. This can include gaming, remote
desktop applications, augmented and virtual reality, cognitive assis-
tance, etc.
In particular, the case of gaming (but also virtual/augmented
reality) applications is particularly interesting in this early phase of
5G deployments, and also gives a concrete idea of services provided to
the customer where E2E latency perceived by the end user is critical.
In fact, gaming applications need short reaction times in order to
provide the best performances. The software startup Edgegap (www.
edgegap.com) proposes solutions to automate the decision-making
process and deployment of gaming servers throughout hundreds of
data centers. As a result, the best MEC server locations are determined,
based on the end users’ location, providing thus gaming applications
running closer to their players (with obvious benefits with respect to
online experiences given by public clouds). In addition, cost savings
are realized by only running games when and where there is actual
user demand.
80 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
4.4.2 Industry Groups
Starting from the latter white paper, due to the huge interest for MEC
in 5G deployments, recently, ETSI ISG MEC also started a work
item [68], with the intention to document the key issues and solu-
tions for MEC integration in 5G networks. In particular, this docu-
ment discusses issues related to MEC Application Function C-plane
interactions with 5GC, including the mapping of MEC procedures
to procedures used in 3GPP 5G system, options for functional split
between MEC and 5G Common API frameworks, organization of
MEC as Application Function(s) of 5G system, and pertinent interac-
tions with the (R)AN. In addition, this work item aims to identify any
yet missing 5G system functionality, for example, to provide indica-
tions about future standardization work needed. This is at the end a
key work for ETSI MEC standard, because in principle, some sup-
port for 5G (dually to the study in SA2) could be foreseen in the ISG.
Impact on MEC
in collab with associations,
verticals, etc…
Requirements
Figure 4.5 Example of process flow for the definition of a network slice, and possible impact on
MEC. (Elaboration from GSMA.)
Notes
1 Note: the concept of network slice is not deeply discussed in this book, but
the interested reader can find relevant resources in 3GPP s pecifications
for 5G system architecture [70].
2 In principle, the MEC architecture [59] also permits stand-alone
implementations, of course based on virtualized infrastructure, but
not necessarily in NVF environments [60]. The second possibility is
better clarified and defined in the second phase of MEC standardiza-
tion [61].
90 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
93
94 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
5.2 Benefits of MEC
5.3 Igniting an Industry
5.5 Business Benefits
just about cost savings. This will also unlock tremendous potential for
new applications and revenue streams.
5G will require a major change in how Telcos plan and operate
their networks. In the meantime, operators don’t have to wait. If they
adopt MEC today, they can benefit immediately and get 5G-like
benefits on 4G networks. Why wait for 5G when existing networks
have the potential to deliver more value, and operators can get more
from what they currently have without massive investments?
Building a platform that keeps existing architectures intact but
provides more capabilities is advantageous for accommodating more
capabilities that may be added in the future. This applies not just to
technology, but also to people, skills, and business processes. This is
particularly notable in an era when adding physical radio capacity can
take up to 18 months, despite many expecting capacities on demand.
Typically, one-third of operator network costs are spent on real estate
to house infrastructure. This includes tens of thousands of p hysical
locations that host radio equipment, transmission a ggregation, and
core services like voice and data processing. There is significant poten-
tial to transform most of these locations into edge compute infrastruc-
ture that can monetize idle processing and storage capabilities due to
how close they are to the user versus a public cloud data center.
When evaluating the potential to monetize MEC, operators will
likely find the following business models most appealing:
• Dedicated edge hosting. The operator manages edge-located
compute and storage resources, making it available to part-
ners like third-party application developers. In this scenario,
the operator is only responsible for ensuring that traffic is
managed and delivered, while the developer takes ownership
of assuring all other aspects of the service. An example could
be a CDN operator that wants to move services even closer to
end users.
• XaaS. The Infrastructure-as-a-Service, Platform-as-a-Service,
and Network-as-a-Service approaches see the Telco operating
similarly to a cloud provider, delivering compute and storage
capabilities, APIs, and virtual network functions through a
cloud portal. The operator may provide a service that is akin
to what is offered by public cloud providers, but with the
10 2 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
One of the fiercest debates raging in telecom is where exactly the edge
of the network is located. The short answer is, it depends.
The operators really want to understand where the equipment will
be deployed so that they can start gaining an understanding of how it
will be managed. There is often a misconception that edge equipment
must be installed at every cell site, but this isn’t necessarily true. For
instance, in the case of traffic management, MEC can be deployed
deeper into the network at aggregation sites. On the other hand,
where ultralow latency is the goal and the intent is to keep as much
traffic off of the network as possible, deploying right at the base sta-
tion may make sense. Of course, there are high costs associated with
this approach given how many more implementations are required.
Fortunately, most MEC applications do not require deployments at
the extreme edge of the network.
THE MEC MARKE T: THE O PER ATO R’S PERSPEC TIVE 10 3
central locations with data centers large enough to scale the physical
compute resources based on capacity needs. The same flexibility is not
available when moving applications to edge locations. As explained
earlier in this chapter, these are locations closer to user access, in the
magnitude of hundreds or thousands per country. They are also much
smaller in terms of footprint, making the maximum compute capacity
and its efficient use of the utmost importance.
Due to their early initial availability, hypervisor-based virtual
machine solutions have been the default choice for NFV deployments.
But these machines bring substantial data footprints and take minutes
to boot, posing challenges in environments with limited resources,
resulting in an emerging preference for container-based virtualiza-
tion solutions. While these solutions can better scale for more efficient
computing, they also require more advanced orchestration.
Many Telcos have started to demand cloud native applications
for better efficiency and compatibility with new virtual infrastruc-
ture. An example of this are the container-based NFVs that lever-
age hyperscaling capabilities, recently developed by cloud providers
like Google and Amazon. Containers bring much less overhead than
virtual machines and can be deployed faster. However, they also
carry new security considerations and network challenges that virtual
machines do not. Containers pose a security risk because they run
directly on server hardware. For instance, a hacker could take advan-
tage of a compromised container to break gain access to an entire
network.
THE MEC MARKE T: THE O PER ATO R’S PERSPEC TIVE 10 5
are three groups that are worth noting and, in one way or another,
related to MEC. Some operators have aligned with one or another,
and they have an impact on the MEC-playing field.
• OpenFog Consortium, a nonprofit group founded in
November 2015, and its members work on “fog comput-
ing,” which adds a hierarchy of compute, storage, network-
ing, and control functions between the cloud and endpoint
devices and between gateways and devices. The nonprofit
says it’s different from MEC because it covers all the lay-
ers between the edge and the cloud, while MEC only covers
the edge and not the cloud. OpenFog is also working with
ETSI to develop fog-enabled mobile edge computing appli-
cations and technologies. The two groups signed a memoran-
dum of understanding (MOU) stating that they will share
work related to global standards development for fog-enabled
MEC technologies including 5G, IoT, and other data-dense
applications.
• The Linux Foundation formed the Akraino Edge Stack
Project back in February 2018 to create an open source soft-
ware stack to improve the state of edge cloud infrastructure
for carrier, provider, and IoT networks. Akraino Edge Stack
will offer users new levels of flexibility to scale edge cloud
services quickly, to maximize the applications or subscribers
supported on each server, and to help ensure the reliability of
systems that must be up at all times. At this time, Akraino
remains an independent initiate from ETSI’s MEC.
• The Open Networking Foundation (ONF)’s Central Office
Re-architected as a Data Center (CORD) project wasn’t
originally targeted at edge computing, but the ONF now
realizes that its code is very relevant to the edge. In fact, the
ONF stated that CORD is becoming the de facto platform
of choice for edge computing because CORD can run in
a tower, a car, a drone, or anywhere. Unlike ETSI’s MEC
ISG, which is working with OpenFog to coordinate on specs
and make them interoperable, ONF said it isn’t coordinating
with any MEC standards group because it is pushing an open
source approach.
10 8 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Notes
1 w w w.zdnet.com/article/iot-devices-will-outnumber-the-worlds-
population-this-year-for-the-first-time/
2 www.mckinsey.com/industries/telecommunications/our-insights/a-
future-for-mobile-operators-the-keys-to-successful-reinvention
6
The MEC M arke t
The Vendor’s Perspective
Let’s explore further who are the potential vendors that will benefit
from the MEC ecosystem. This list is by no means exhaustive or pre-
cise but explores the potential opportunities and segments that MEC
opens up.
Mobile Operators: yes, as we have seen in Chapter 5, mobile oper-
ators can also be MEC vendors. These network providers offer the
source for the network edge that brings services closer to the user.
By opening up their edge to third-party applications, they become
a vendor of MEC capabilities. This opportunity comes in-line with
the ambition some operators have expressed in terms of transforming
their network into a platform where new innovative third-party appli-
cations can be easily developed and deployed.
Application Developers: these companies build apps that benefit
from edge computing, such as virtual reality or augmented reality
apps. Until now, these companies have been relying on the computing
power and storage of end user devices and the average connectivity
and latency provided by current networks. Applications have to be
developed with strong fail-safe mechanisms to cope with potential
degradation of network connections, which excludes mission-critical
and low-latency applications from being hosted from the cloud. Many
of those mission-critical applications have been developed on user
devices, raising the requirement for strong computing capabilities
on those devices. The evolution of smartphones and specialized edge
devices have provided a growing platform for developers; however, the
requirement to support multiple hardware types and operating sys-
tems makes it very expensive for the application developers. Having a
common platform at the edge of the network, with the added benefit
of low-latency, high-bandwidth, and radio network information cre-
ates a whole new world of possibility for application developers. The
real big question is how open and ubiquitous will this environment be
across carriers and geographies.
Over-the-Top (OTT) Players: they are providers whose service
goes over the Internet and can be used regardless of what network
T HE M EC M A RK E T: T HE V EN D O R’ S P ERS P EC TI V E 113
provider the user has. While there is friction as OTT services pull users
away from services provided by network operators (commonly voice
and messaging services), there is potential for partnering and coop-
eration for the best possible user experience. There will always be the
net neutrality argument when it comes to OTT players and network
operators; however, we are now entering a new era where operators can
provide a “platform” type of service on top of traditional connectivity.
Network Software Vendors: a number of smaller vendors have
emerged over the last few years, primarily focused on developing
software-based network applications. The development of network
function virtualization (NFV) and SDN standards has created the right
environment for these vendors to gain market share; however, they have
strong competition from the traditional Telco vendors that have put a
fierce fight to maintain their market dominance by either reducing price
points on legacy technology or offering attractive promotions for Telco
to transition to NFV with them. One of the challenges of NFV so far
is that it has been focusing on the existing network function to migrate
from monolithic to software-based, giving the advantage to existing
vendors that can provide a safer transition path to their Telco customers.
MEC creates both a completely new infrastructure layer within
the telecom operators’ network as well as a set of network functions
inexistent until now. This is new ground the network software ven-
dors can explore and leverage their core software expertise and ability
to quickly adapt to new requirements as they are not bound to any
historical technological trajectory.
Telecom Equipment Vendors: these are manufacturers of network
infrastructure, such as Nokia, Huawei, Ericsson, Cisco, and others.
Like in every step of the Telco architecture evolution, the incumbent
tier 1 vendors are the ones best positioned to be the vendors of the new
technologies. Understandably, they are some of the biggest contribu-
tors to the new architecture standards – see the number of employees
they have working on ETSI working groups (MEC included) –
thus influencing outcomes in favor of some of their R&D efforts, or
through the acquisition of start-ups and other smaller companies.
Despite their pole position when it comes to supplying new tech-
nologies to telecom operators, these equipment vendors often delay
commercialization of new technologies either because they can can-
nibalize other revenue streams, or because the business case is still
114 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Let us look at some areas where MEC will create the highest value
opportunities and who are the main vendors to benefit from it:
Network Efficiencies: for network operators, where mobile, fixed,
cable, and other Internet infrastructure providers can be included, the
most visible benefit will come from cost efficiencies. This is typically
the approach they take since they are still very much focused on pro-
viding voice and data connectivity services. The exponential growth
of data connectivity keeps pushing them toward more efficient, or
cheap, infrastructure solutions.
Combined with the existing NFV/SDN work being done by
mobile operators to optimize networks and reduce CAPEX, MEC
can be another tool in their toolbox. It could in theory lower the
bandwidth usage on their backend transport networks and the asso-
ciated cost, making this one of the first angles they have been look-
ing at MEC.
The vendors most likely to benefit from these revenue streams are
the traditional network vendors as they can bundle these network
efficiency services with the traditional RAN, transport, or core com-
ponents. Have a look at the initial MEC use cases and what those
vendors have been talking about when they refer to MEC and you
will understand it.
Real Estate: the simplest business model to understand related to
edge computing is simply space. Tower operators, mobile network
operators, and cell site owners can rely on the collocation model and
charge others to locate at certain edge locations.
This might be a surprising new revenue stream when talking about
MEC and can be a more interesting one for tower operators rather
than mobile operators, who are seeking higher profitable services. On
the other end, there can also be the opportunity for cloud providers,
like Amazon, Google, or Microsoft Azure, to start gaining share at
edge real estate and provide hosting services for both mobile network
operators as well as other verticals.
Unlike public clouds that rely on big centralized data centers and
always look for locations with low square meter (or foot) cost or poten-
tial tax advantages, edge cloud relies on high-cost beachhead prop-
erty. We are talking about locations close enough to the users and
those are typically in urban locations or suburban office locations,
where the property cost tends to be higher.
T HE M EC M A RK E T: T HE V EN D O R’ S P ERS P EC TI V E 117
6.4.2.4 Loss of Data The most obvious risk from inadequate security
and protective measures is the loss of data to those who may wish to
intercept and steal it. Not only is personal and sensitive data at risk of
interception, but also the metadata generated by edge devices detail-
ing the type and source of data from connected edge devices.
Details such as what services and applications a user accesses, the
identity of who is connecting to the network, and all the details that
would be available through other unencrypted data such as email con-
tent and recipients could all be accessed by determined hackers with
the right resources and know-how.
Vendors play a key role and will have to be prepared to address
security concerns and provide the necessary mechanisms for tele-
com operators to monitor and enforce the necessary security, both on
infrastructure and data transport levels.
Figure 6.1 Examples of industries considering private LTE networks. (Source: Qualcomm.)
12 2 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Notes
1 www.grandviewresearch.com/press-release/global-edge-computing-
market
2 www.lfedge.org/projects/akraino/
3 https://telecominfraproject.com/edge-computing/
4 www.lanner-america.com/blog/multi-access-edge-computing-part-
2-security-challenges-protecting-securing-mec/
5 www.qualcomm.com/media/documents/files/private-lte-networks.pdf
7
The MEC M arke t
The Over-the-Top Player’s Perspective
12 5
12 6 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
7.3 XaaS
In the XaaS model, the CSP owns and manages the cloud infra-
structure across its MEC locations and offers this infrastructure as
a service to the various OTT providers. Because the physical infra-
structure is owned by the CSP, the CSP is responsible for the opera-
tion and maintenance of this infrastructure. The OTT actor also
does not carry any CAPEX burden. This makes the approach attrac-
tive to OTT actors that are already entirely in the cloud and those
who simply do not have the scale to operate infrastructure at a global
level.
Another advantage of a CSP-owned and -operated infrastructure
is the ability to deliver SLA-differentiated services. Given the needs
of their own internal clouds, CSPs have internal know-how on how
to design and deploy edge cloud infrastructure that can meet require-
ments such as those of critical infrastructure, public safety, and high
availability (e.g., for industrial automation). These SLAs are not typi-
cal in existing cloud deployments. Yet, with CSP-operated infrastruc-
ture, applications can simply request such SLAs as part of the service
(presumably, a cost is associated with these).
The issue of application deployment is also an important one.
Understanding when and where to deploy edge instances of applica-
tion components is a highly complicated task and getting it wrong
can mean significant impact on both user experience and cost. While
some application providers will do this themselves, many, especially
smaller ones, lack the scale and know-how to do so. With an XaaS
model, the CSP can take over providing this as a service offered to
the applications running on its edge cloud (e.g., as part of an SLA
M EC M A RK E T: O T T P L AY ER’ S P ERS P EC TI V E 12 9
Finally, gray is used to indicate that support may be limited. For the
OTT Actor Type side, dots are used to indicate high need for a fea-
ture, while stripes is used to indicate low-need. The extent to which
white on the left and dots on the right match – and black on the left
and dots on the right do not – is a good indicator of how appropriate
a particular MEC market model is to each particular type of OTT
player.
8
The MEC M arke t
The New Verticals’ Perspective
131
13 2 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
5G
4G
3G
2G
time
Figure 8.1 Waves of services and their revenue streams correlated with the network evolution.
come from various and heterogeneous business areas, and drive new
use cases for the communication systems; for example:
• automotive and cooperative vehicles,
• virtual reality/augmented reality,
• Internet of Things (IoT) (sensors, fog nodes, etc.),
• robotics and factories of the future,
• eHealth and mHealth,
• media and entertainment vertical,
• applications for the energy industry.
These typically also correspond to 5G use cases, where industry
verticals are indeed bringing new technical requirements, and
practically driving the evolution of communication systems toward
5G (and beyond). Most of the market forecasts are also emphasiz-
ing that revenues coming from vertical streams will increase in
the future, and potentially overcompensate the decrease of value
coming from voice and traditional data services. Figure 8.1 shows
in a qualitative way the described trend, thus associating waves of
services and their revenue streams with the network evolution (for
more details about the so-called “waves”, the interested reader can
have a look at Ref. [77]).
As an important clarification, new revenue streams are not expected
to be captured mainly by operators. On the contrary, the ecosystem
is becoming more complex and imposing different business models,
including collaboration, revenue sharing, different level of partner-
ships, etc. As a meaningful example of new market value generated
by verticals in 5G, we can consider IoT: according to GSMA forecasts
[79], the total ecosystem IoT revenue in 2024 will be around 4,300
M EC M A RK E T: NE W V ER TI C A L S P ERS P EC TI V E 13 3
8.1.2.1 Smart Transportation
8.1.2.2 Smart Manufacturing
8.1.2.4 eHealth
8.1.2.5 Smart Cities
8.2.1 Performance Improvement
app
app
macro
Figure 8.2 Different MEC deployment options and related E2E delay performance.
MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
M EC M A RK E T: NE W V ER TI C A L S P ERS P EC TI V E 141
We have seen that all the described vertical segments are driving the
traffic explosion and are imposing new requirements for the intro-
duction of 5G systems. Figure 8.3 shows, in particular, the expected
number of connections, differentiated per traffic type.
Figure 8.3 Global M2M connection growth by industries. (Source: Cisco [82].)
M EC M A RK E T: NE W V ER TI C A L S P ERS P EC TI V E 14 3
Cloud Computing
Big Data
Industry
8.3.1 Cost Aspects
the industry vertical may install any kind of edge platform (e.g., in
collaboration with suppliers and system integrators); instead, with the
PaaS model, the operator is already offering an MEC environment,
where the vertical may directly deploy applications (again, possibly in
cooperation with suppliers and system integrators). Instead, the third
model is essentially adopted in the extreme case where the vertical
is using directly a complete software solution offered by the opera-
tor (i.e., including both MEC platform and MEC applications). For
that reason, we have analyzed more in detail the main cost structures
related to the two models, considered as most probable ones (PaaS
and IaaS), as follows:
• PaaS – with this model, both 5G network infrastructure and
MEC servers (including an MEC platform) are hosted by
MNO and offered to the industry vertical. In this case, the
vertical may neglect CAPEX components of the overall costs,
and sustain only OPEX, which usually range from design
to operation and maintenance of SW instances (e.g., MEC
applications, and related management and orchestration).
• IaaS – with this model, both 5G network infrastructure and
MEC servers (excluding an MEC platform) are hosted by
MNO, and offered to the industry vertical. In this case, the
vertical may need to install and operate not only MEC appli-
cations, but also an MEC platform in the target MEC hosts
of the MEC system. This also implies the need to manage
and orchestrate the whole MEC system. Here, many sub-
cases are possible. One of them is the following: since this
IaaS model requires a more complex cost management, the
vertical may decide to leverage on a collaboration with suppli-
ers and system integrators, who may take the responsibility of
the MEC system layer, while the vertical may concentrate its
efforts on the application layer only.
Remote Remote
Server Server
MEC2 MEC2
MEC1 MEC1
UE
MNO2 MNO1 MNO2 MNO1
Figure 8.5 Example of MEC deployment for V2X in multi-operator environments [111].
Notes
1 When talking about Internet of Things, some people also refer to Fog.
2 A careful reader may notice that sometimes, a company can be, in prin-
ciple, categorized in more than one vertical. In addition to that, it may
happen that companies expand their business and start focusing on areas
where initially they were not present. For these reasons, the above cat-
egorization should not be considered as a limitation, but just as a tool to
identify the main impacts on MEC coming from very heterogeneous
requirements.
15 2 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
3 On the other hand, data transport saving is also one important advan-
tage of edge computing. Nevertheless, this aspect should be c onsidered
more as a benefit from the point of view of the operator, which is in
fact operating the communicating network, instead of the industry
vertical.
Part 3
MEC
Deployment
and the
Ecosystem
9
MEC D eployments
Cost Aspects
9.1 Infrastructure Evolution
• Some more recent studies [103] have also assessed the overall
consumption by considering not only the RAN part, but
also the infrastructure equipment present in mobile sites (air
conditioning, power supply, and so on), showing that centraliz-
ing BB processing in C-RAN environments may lead to signifi-
cant savings, with respect to a typical flat architecture [102,104].
After these preliminary steps toward C-RAN architecture, the current
trend followed by operators in the framework of 5G is now the migra-
tion toward a Virtual RAN (V-RAN). In this phase, virtualization (on
general-purpose hardware [HW]) enables the abstraction from a par-
ticular operating system. This is usually done by a “hypervisor.” Some
functionalities are executed running as virtual machines (VMs), and the
virtualization approach preferably follows the general ETSI network
function virtualization (NFV) framework. Figure 9.2 shows an example
of V-RAN implementation, where multiple VMs represent single radio
access techniques (RATs), for example, 2G and 3G, or by subsystems of
the protocol stack of a single RAT (e.g., PHY, MAC, RLC).
Talking about the advantages of Virtual RAN for the operator, we
can say that V-RAN has all the C-RAN advantages, in addition to
the following (due to usage of general-purpose hardware):
Virtual
Baseband pool
9.1.3 Devices Evolution
8KMOUTGR
(9 +JMK4UJKY
*)
APP
APP APP
=OXKRKYY
\)6+ 3+) 3+)
3+) 3+)
*; ;6,
;6, 4,<Y ;6, <4,Y
((; );
.USK )USV[ZK 4KZ]UXQ 9ZUXGMK )USV[ZK 4KZ]UXQ 9ZUXGMK )USV[ZK 4KZ]UXQ 9ZUXGMK
…
Backbone
Network Network Network
,OXS
++JKRG_
4[SHKXULYOZKY
M EC D E P L OY M EN T S: C O S T A S P EC T S
4,<Y 3+)VRGZLUXS
;6,
/GG9
lower level of clouds, the offered E2E delay is lower (left-hand side of
the picture), but at a prize of a bigger number of sites; instead, a higher
E2E delay is offered by a small number of bigger DCs (right-hand side).
This fundamental trade-off has already been described earlier in
this book, and the actual choice among different deployment options
essentially depends on the infrastructure owner’s decision on the edge
cloud business model. All main models are described in the following
section, together with their associated cost structure, which has an
impact on business convenience, both in terms of CAPEX and OPEX
of the overall infrastructure (depicted in Figure 9.4). Nevertheless, it
is worth noting that sometimes the decision of the operator can be
also driven by other motivations, for example, due to liability, secu-
rity, or again strategic ownership and control, to mitigate the risk of
disintermediation from the other stakeholders.
The simplest offering model (called Real Estate [RE] model here)
is essentially the rental of all edge facilities and gives mostly all
M EC D E P L OY M EN T S: C O S T A S P EC T S 16 5
4,<Y 3+)VRGZLUXS
;6,
/GG9
9.3.2 Infrastructure-as-a-Service (IaaS)
With this model, both the physical and virtual infrastructure are
provided to third parties, thus offering not only room facilities,
cooling, and external connectivity in the data center, but also v irtual
hardware resources (compute network and storage) that could be
16 6 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
4,<Y 3+)VRGZLUXS
;6,
/GG9
9.3.3 Platform-as-a-Service (PaaS)
With this model, not only virtual resources (compute network and
storage) are provided to third parties, but also an MEC platform and
eventually other network functionalities (depicted below as VFNs).
In fact, depending on the owner (which can be an operator or simply
a cloud provider), the network functionalities may be (or not) present
in the edge data center, or in any case may be (or not) exposed to the
tenant (Figure 9.7).
M EC D E P L OY M EN T S: C O S T A S P EC T S 16 7
4,<Y 3+)VRGZLUXS
;6,
/GG9
This model is a variant of the PaaS, where the owner may be inter-
ested in offering as well some value-added services, for example,
through collaboration with third parties and companies specialized
in different fields (like financial services, big data analysis, or content
distribution network (CDN) platform and content providers, system
integrators for automotive or industrial automation, etc.). In this case,
the collaborative approach with verticals and other industrial play-
ers provides a rich set of functionalities to application developers, for
example, with a set of (RESTful) APIs organized in a sort of middle-
ware exposed at the application level (Figure 9.8).
This is the most open and collaborative model, associated of course
with the highest level of costs, which include (in addition to the
items given by previous business models) also the management of the
MEC platform to ensure full operational add-value MEC services.
In addition, the owner takes the responsibility of also guaranteeing
the actual performance of offered services. On the other hand, more
16 8 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
4,<Y 3+)VRGZLUXS
;6,
/GG9
Servers + Facilities
Head count + + OS and
(permanent, consulting) Management
+ TOTAL +
DATA CENTER
Network Storage and
COST
Backup and
Recovery
÷
TOTAL BUSINESS-SPECIFIC
SERVICE UNITS
=
COST PER SERVICE UNIT
Figure 9.9 Example of calculation of normalized cost per service unit. (Source: Intel [98].)
where, for example, a cost per service unit is derived (here, all categories
of cost are considered and divided by the number of units for that
environment, such as EDA-MIPS of performance per system). The
advantage of this approach is to have a more effective benchmark of
data center performance and cost assessment, for example, to p rioritize
data center investments.
The PaaS model adds to IaaS essentially all costs specifically related
to the MEC platform. In this case, there may be several variants, as the
operator may decide to deploy MEC in a stand-alone NFVI infrastruc-
ture, or to use the same general-purpose hardware (which is supposed
to be already present for NFV deployments) and to offer in addition the
MEC components under the same NFVI. This second case, from a cost
perspective, appears to be the most convenient, even if the reader should
consider that operators may take very different decisions, depending
on country-specific situations, or management costs related to specific
deal conditions, or again other business reasons (e.g., liability, security).
For this reason, the exact cost evaluation will depend on the specific
deployment and operator choices. Nonetheless, Table 9.1 provides quite
a comprehensive list of the main cost items for the PaaS model for edge
cloud offering, divided per category (CAPEX and OPEX).
In particular, the costs (both CAPEX and OPEX) associated with
the physical and virtual infrastructure are very relevant for the opera-
tor, and for that reason, the decision to deploy a new edge site needs
17 0 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
Table 9.2 Edge Cloud Cost Structure (PaaS Model) – MEC in NFV Case
CAPEX (CAPITAL EXPENDITURES)
COST ITEM COMMENTS
MEC platform Purchasing of basic MEC platform (ETSI GS MEC 011),
optionally with selected MEC APIs (ETSI GS MEC 009)
MEPM, MEC-O, OSS Integration of MEC platform in the network and OSS/BSS
OPEX (OPERATIONAL EXPENDITURES)
COST ITEM COMMENTS
Cost of operation staff, consultants Including management, operation, and maintenance of
virtual infrastructure
Sales and marketing costs Specific edge offers depend on the customized
functionalities and targeted customers
License fees of MEC server This can be provided by a third party, expert in the field
needs. Incidentally, the creation of new services was also the natural
reason for the creation of MEC.
Notes
1 For further deepening, Ref. [90] provides a detailed analysis of the
improvements and cost savings enabled by this relatively recent data
center strategy over the years.
2 NOTE: this movement is relatively recent; however, the reader should
keep in mind that hyperscale computing is not just an American phenom-
enon; it is global, with leading players around the world (e.g., including
companies well-known under the acronym of BAT, i.e., Baidu, Alibaba,
and Tencent, driving significant innovation across Asia).
3 www.intel.com/content/www/us/en/architecture-and-technology/rack-
scale-design-overview.html
4 More info for Cloud IoT Edge can be found here: https://cloud.google.
com/iot-edge/
5 https://root-nation.com/gadgets-en/smartphones-en/en-ai-in-smart-
phones/
6 www.cloudcooler.co.uk/edge-computing
7 https://en.wikipedia.org/wiki/Business_Model_Canvas
10
The MEC E cosystem
In the second part of this book (Chapters 5–8), we have analyzed the
MEC market from different perspectives. More widely, the MEC
ecosystem is composed of a bigger set of stakeholders, and hetero-
geneous type of players, which have a role in the adoption of MEC
technologies. Figure 10.1 depicts the main sectors composing the
huge MEC ecosystem.
As we can see, this ecosystem is quite diverse and complex, and on the
other hand, it is worth identifying some high-level categories, based on
their actual usage of MEC technology. For this purpose, we can iden-
tify the following main profiles of stakeholders in the MEC ecosystem:
• Operators and Service Providers
• Traditional Vendors (providing Telco infrastructure)
• IT Infrastructure Providers (generic IT Cloud)
• Verticals and System Integrators (including SMEs/start-ups)
• Software Developers (including not only over-the-top (OTT)
and big companies but also start-ups, SW houses, application
developers, research communities, etc.)
17 5
17 6 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
IoT gateway
RAN
CN
MEC
Ecosystem
E-Health Automotive
device
PC
Laptops
Devices
AR/VR/
multimedia
IT infra
LEGENDA
1 2
11. Delay improvement
22. Network utilization and cost savings
33. Energy efficiency, TCO analysis
4 44. Computational and networking resources
2 3
Figure 10.2 KPIs for MEC and impact on business. (Elaboration from Ref. [54])
10.1.5 Software Developers
IoT Edge modules are containers that run Azure services, third-party
services, or custom code; these modules are deployed to IoT Edge
devices and execute locally on them. The IoT Edge runtime runs on
each IoT Edge device, managing the deployed modules, while the IoT
Hub is a cloud-based interface for remotely monitoring and managing
IoT Edge devices.
Figure 10.5 The ecosystem of ETSI ISG MEC members and participants.
in that group (Figure 10.5) recognized the need to place side by side
the traditional standards activities on MEC with ecosystem engage-
ment activities. In the following section, we describe few exemplary
ETSI ISG MEC activities going into this direction of better engage-
ment of a diverse set of stakeholders and to bridge the gap with
developers.
The first initiative agreed in the ISG was the creation of an MEC PoC
framework [105], where the group defined a methodology8 for sub-
mitting, approving, and managing PoC in ETSI ISG MEC. Proofs
of concept are in fact an important tool to demonstrate the viability of
a new technology and provide feedback to the standardization work.
The MEC PoCs (listed also in the MEC wiki page: https://
mecwiki.etsi.org) are intended as multiparty projects showcasing early
implementations of few selected MEC components, the results of
which are fed back to the ISG, for a proper feedback on the normative
work. Nevertheless, these are not intended as MEC-compliant imple-
mentations: in fact, neither ETSI, its ISG MEC, nor their members
make any endorsement of any product or implementation claiming to
demonstrate or conform to MEC (and no verification or test has been
performed by ETSI on any part of these MEC PoCs).
10.2.2 MEC Hackathons
The second step in the ecosystem engagement was done by the ISG
MEC, with the approval of an MEC Hackathon Framework (also
18 6 MULTI - AC C E S S ED G E C O M P U TIN G IN AC TI O N
The last framework created by the ISG was related to the MEC
Deployment Trials (MDTs).10 These are evolutions of PoCs, where
MEC technologies are demonstrated in commercial trials/deployments,
thus not anymore as simple lab/prototype implementations.
The list of active MDTs is again published in the MEC wiki, and for
each approved MDT, the team is expected to demonstrate their MDT
proposal at a public event, for example, Public Exhibition, ISG MEC
meeting, or other events, by means outlined in their own MDT proposal.
10.3 Industry Groups
10.5 Research Communities
Notes
1 https://en.wikipedia.org/wiki/Open_innovation
2 https://tmt.knect365.com/edge-computing-congress/etsi-mec-hackathon
3 https://edgegravity.ericsson.com/application-providers/
4 www.your-now.com/our-solutions/share-now
5 www.continental-corporation.com/en/press/press-releases/2019-03-21-
car2mec-168160
6 https://aws.amazon.com/lambda/edge/
7 These should be intended as “smart” edge devices, of course. In fact,
Greengrass requires at least 1 GHz of compute (either Arm or x86),
128 MB of RAM, plus additional resources for OS, message through-
put, and AWS Lambda execution. According to Amazon, “Greengrass
Core can run on devices that range from a Raspberry Pi to a server-level
appliance”.
8 https://mecwiki.etsi.org/index.php?title=PoC_Framework
9 https://mecwiki.etsi.org/index.php?title=MEC_Hackathon_Framework
10 https://mecwiki.etsi.org/index.php?title=MEC_Deployment_Framework
11 www.etsi.org/newsroom/press-releases/1548-2019-02-etsi-multi-access-
edge-computing-opens-new-working-group-for-mec-deployment
12 https://wiki.akraino.org/display/AK/MEC+API++Framework
13 https://wiki.openstack.org/wiki/Edge_Computing_Group
References
1. E. Dalhman, et al., 4G, LTE-Advanced-Pro and the Road to 5G, 3rd Ed.,
Academic Press, Cambridge, MA, 2016.
2. M. Olsson, et al., EPC and 4G Evolved Packet Networks, 2nd Ed.,
Academic Press, Cambridge, MA, 2013.
3. J. Cartmell, et al., Local Selected IP Traffic Offload Reducing Traffic
Congestion within the Mobile Core Network, in Proceedings IEEE
CCNC 2013, Las Vegas, Nevada, USA, 2013.
4. SCF046, “Small Cell Services.” Available at: http://scf.io/en/
documents/046_Small_cell_services.php.
5. SCF084, “Small Cell Zone Services: RESTfule Bindings.” Available
at: http://scf.io/en/documents/084_-_Small_Cell_Zone_services_
RESTful_Bindings.php.
6. SCF091, “Small Cell Application Programmer’s Guide.” Available at:
http://scf.io/en/documents/091_-_Small_cell_application_programmers_
guide.php.
7. SCF014, “Edge Computing Made Simple.” Available at: http://scf.io/
en/documents/014_-_Edge_Computing_made_simple.php.
8. NIST Special Publication 500-325, “Fog Computing Conceptual
Model: Recommendations of the National Institute of Standards and
Technology,” 03/2018. Available at: https://doi.org/10.6028/NIST.
SP.500–325.
9. NGMN, “5G White Paper,” 2015. Available at: www.ngmn.org/filead-
min/ngmn/content/downloads/Technical/2015/NGMN_5G_White_
Paper_V1_0.pdf.
10. ETSI, “Mobile Edge Computing: A Key Technology Towards 5G,”
2015. Available at: www.etsi.org/images/files/ETSIWhitePapers/etsi_
wp11_mec_a_key_technology_towards_5g.pdf.
19 3
19 4 Ref eren c e s
27. OpenStack, “Cloud Edge Computing: Beyond the Data Center.” Available at:
www.openstack.org/assets/edge/OpenStack-EdgeWhitepaper-v3-online.
pdf (accessed Jan. 2019).
28. VmWare Project Dimension, www.vmware.com/products/project-
dimension.html (accessed Jan. 2019).
29. ETSI GS MEC 010-1, “Mobile Edge Computing (MEC); Mobile
Edge Management; Part 1: System, host and platform m anagement,”
v. 1.1.1, 10/2017. Available at: www.etsi.org/deliver/etsi_gs/MEC/
001_099/01001/01.01.01_60/gs_MEC01001v010101p.pdf.
30. ETSI GS MEC 010-2, “Mobile Edge Computing (MEC); Mobile Edge
Management; Part 2: Application Lifecycle, Rules and Requirements
Management,” 07/2017. Available at: www.etsi.org/deliver/etsi_gs/
MEC/001_099/01002/01.01.01_60/gs_MEC01002v010101p.pdf.
31. ETSI GS MEC 016, “Mobile Edge Computing (MEC); UE Application
Interface,” v. 1.1.1, 09/2017. Available at: www.etsi.org/deliver/etsi_gs/
MEC/001_099/016/01.01.01_60/gs_MEC016v010101p.pdf.
32. ETSI GR MEC 017, “Mobile Edge Computing (MEC); Deployment of
MobileEdgeComputinginanNFVEnvironment,”v.1.1.1,02/2018.Available
at: www.etsi.org/deliver/etsi_gr/MEC/001_099/017/01.01.01_60/gr_
MEC017v010101p.pdf.
33. ETSI GS MEC-IEG 004, “Mobile-Edge Computing (MEC); Service
Scenarios,” v. 1.1.1, 11/2015. Available at: www.etsi.org/deliver/etsi_gs/
MEC-IEG/001_099/004/01.01.01_60/gs_MEC-IEG004v010101p.
pdf.
34. ETSI GS MEC 002, “Multi-access Edge Computing (MEC); Phase
2: Use Cases and Requirements,” v. 2.1.1, 10/2018. Available at:
www.etsi.org/deliver/etsi_gs/MEC/001_099/002/02.01.01_60/gs_
MEC002v020101p.pdf.
35. Hewlett Packard Enterprise, “Edge Video Analytics. HPE Edgeline IoT
Systems with IDOL Media Server Enable Exceptional Scene Analysis &
Object Recognition Performance.” Available at: https://support.hpe.com/
hpsc/doc/public/display?docId=emr_na-c05336736&docLocale=en_US.
36. HPE, AWS, Saguna, “A Platform for Mobile Edge Computing.” Available
at: www.saguna.net/blog/aws-hpe-saguna-white-paper-platform-for-
mobile-edge-computing/ (accessed Jan. 2019).
37. 3GPP TR 22.866, “Study on Enhancement of 3GPP Support for 5G
V2X Services (Release 16),” v. 16.2.0, 12/2018.
38. ETSI GS MEC 022, “Multi-access Edge Computing (MEC); Study on
MEC Support for V2X Use Cases,” v. 2.1.1, 09/2018.
39. ETSI, “Cloud RAN and MEC: A Perfect Pairing,” 2018. Available at:
www.etsi.org/images/files/ETSIWhitePapers/etsi_wp23_MEC_and_
CRAN_ed1_FINAL.pdf.
40. ETSI, “MEC Deployments in 4G and Evolution Towards 5G,” 2018.
Available at: www.etsi.org/images/files/ETSIWhitePapers/etsi_wp24_
MEC_deployment_in_4G_5G_FINAL.pdf.
41. ETSI, “MEC in 5G Networks,” 2018. Available at: www.etsi.org/
images/files/ETSIWhitePapers/etsi_wp28_mec_in_5G_FINAL.pdf.
19 6 Ref eren c e s
2 01
202 In d e x