Cloud Computing in 5G Era

Cloud Computing in 5G Era

5G is that it is designed for forward compatibility—the ability to flexibly 

support future services.

5G is used across three main types of connected services.

Enhanced mobile broadband

In addition to making our smartphones better, 5G mobile technology can 

usher in new immersive experiences such as VR and AR with faster, more 

uniform data rates, lower latency, and lower cost‐per‐bit.

Mission‐critical communications

5G can enable new services that can transform industries with u

ltra‐reliable, 

available, low‐latency links like remote control of critical infrastructure, 

vehicles, and medical procedures.

5G is the 5th generation mobile network. It is a new global wireless 

standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of 

network that is designed to connect virtually everyone and everything 

together including machines, objects, and devices.

5G wireless technology is meant to deliver higher multi‐Gbps peak data 

speeds, ultra low latency, more reliability, massive network capacity, 

increased availability, and a more uniform user experience to 

users. Higher performance and improved efficiency empower new user 

No alt text provided for this image

MCC is a cloud computing system including mobile devices and 

delivering applications to the mobile devices.

Key features of MCC for 5G networks include sharing resources for 

mobile applications and improved reliability as data is backed up and 

stored in the cloud. 

As data processing is offloaded by MCC from the devices to the 

cloud, fewer device resources are consumed by applications.

Compute‐intensive processing of mobile users’ requests is off‐loaded 

from mobile networks to the cloud. Mobile devices are connected to 

mobile networks via base stations (e.g., base transceiver station, 

access point, or satellite).

Edge Computing in 5G ‐ Applications

• Healthcare

• Entertainment and multimedia applications

• Virtual reality, augmented reality, and mixed reality

• Tactile internet

• Internet of Things

• Factories of the future

• Emergency response

• Intelligent Transportation System

No alt text provided for this image

Handle massive amount of data is generated by mobile devices/ 

IoTs Stringent QoS requirements are imposed to support highly 

interactive applications, requiring ultra‐low latency and high 

throughput Heterogeneous environment must be supported to allow inter‐

operability of a diverse range of end‐user equipment, QoS

requirements, network types etc. 



R.SUGESH

III BE Computer Science And Technology

To view or add a comment, sign in

More articles by Sugesh R

  • TCS Tata Consultancy Services

    Title: TCS: Navigating the Digital Frontier in the Global IT Landscape Introduction: Tata Consultancy Services (TCS), a…

  • Artificial Intelligence

    Title: The Transformative Power of Artificial Intelligence: Shaping the Future Landscape Introduction: Artificial…

  • JAVA BOOTCAMP

    INTRODUCTION: Our Students from department of COMPUTER SCIENCE AND TECHNOLOGY was thrilled to have organized and…

    1 Comment
  • SAAS (Cloud Computing)

    Software as a service (SaaS) is a software distribution model in which a cloud provider hosts applications and makes…

  • JAVA

    James Gosling, Mike Sheridan, and Patrick Naughton initiated the Java language project in June 1991.Java was originally…

  • Cloud Computing

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of…

  • MY DREAM COMPANY

    From 1996 to 2009, the company was known as AdventNet, Inc. and initially provided network management software.

  • (RPA) ROBOTIC PROCESS AUTOMATION

    Robotic process automation (RPA), also known as software robotics, uses intelligent automation technologies to perform…

  • Artificial intelligence

    Artificial intelligence (AI) is intelligence demonstrated by machines, as opposed to the natural intelligence displayed…

  • CYBER SECURITY

    Cyber Security involves the practice of implementing multiple layers of security and protection against digital attacks…

Explore content categories