{"id":53916,"date":"2022-04-01T09:33:25","date_gmt":"2022-04-01T01:33:25","guid":{"rendered":"https:\/\/version-2.com\/?p=53916"},"modified":"2022-08-19T15:18:36","modified_gmt":"2022-08-19T07:18:36","slug":"edge-in-depth-5-key-edge-computing-topologies","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/04\/edge-in-depth-5-key-edge-computing-topologies\/","title":{"rendered":"Edge In Depth: 5 Key Edge Computing Topologies"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"53916\" class=\"elementor elementor-53916\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p>If you\u2019ve spent any time in the networking trenches, you\u2019ve no doubt spent many hours puzzling over an assortment of network topology charts. These visual representations of a network tell an important story of how the various components in a network are connected to each other and how data is transferred between its constituent nodes. <\/p> <figure><img decoding=\"async\" src=\"https:\/\/www.scalecomputing.com\/images\/network-graphic.png\" alt=\"\"><\/figure> <p>These topologies are more than just fancy diagrams &#8211; they essentially serve as a living blueprint that describes how a network functions and data is routed. Choosing the right topology will go a long way towards improving the performance and efficiency of your network, as well as help to rationalize how certain resources should be allocated and can provide a roadmap that\u2019s essential for troubleshooting when network connectivity issues arise.<\/p> <p>Over the past few decades, a wide variety of network topologies have been established, each of which caters to a specific environment or use case. However, as the network continues its inexorable march towards the edge \u2013 where connectivity can be intermittent and skilled resources are scarce \u2013 we will likely see a number of new topologies arise that take these constraints into consideration. <\/p> <p>As Alan R. Earls, author of <a href=\"https:\/\/info.scalecomputing.com\/gorillaguide\">The Gorilla Guide to: Enabling IT at the Edge<\/a>, notes in his explanation of the most likely edge topologies: \u201cWhile the never-ending evolution of information technologies makes it hard to predict exactly what topologies will emerge or seem most appealing in the future, there are currently several strong contenders for edge computing.\u201d These five edge topologies include:<\/p> <h2><strong>1. Regional Data Center Edge<\/strong>: CDN, Telecom DC, Colocation.<\/h2> <p>This might be a service provider configuration with multiple tenants and, in comparison with other edge computing scenarios, is typically a very large-scale operation that differs from a traditional data center only in its relationship to an even larger central data center and in usually having a narrower focus.<\/p> <h2><strong>2. Local Data Center Edge<\/strong>: Small Data Center, Micro Data Center.<\/h2> <p>This type of edge computing is likely general-service-oriented, perhaps for a remote office or branch office and is characterized by low or no staffing.<\/p> <h2><strong>3. Gateway Edge:<\/strong> Intelligent Local\/Field Gateway<\/h2> <p>This typically comprises a small cell or access point, such as a video management software (VMS) surveillance system and offers zero touch provisioning (ZTP) and configuration management.<\/p> <h2><strong>4. Device Edge:<\/strong> Embedded Computing Devices and Traditional PLCs.<\/h2> <p>This type of edge, typically a single machine or work cell, has only enough intelligence to assist with a specific operation and provide some de- gree of reporting.<\/p> <h2><strong>5. Compute Edge:<\/strong> Edge Server\/Storage Outside of a Data Center.<\/h2> <p>Examples of this type of true edge computing potentially have the ability to include specialized services, such as video analytics-based applications and likely include ZTP.<\/p> <p>It\u2019s important to note that these topologies aren\u2019t rigid. There are gray areas and some edge implementations can actually include multiple topologies. However, in most instances, one is clearly predominant.<\/p> \n\n<p><strong>To learn more about what future edge topologies might look like, download Scale Computing\u2019s free ebook: \u201c<a href=\"https:\/\/info.scalecomputing.com\/gorillaguide\">The Gorilla Guide to: Enabling IT at the Edge<\/a>\u201d<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241e357 elementor-widget elementor-widget-shortcode\" data-id=\"241e357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18138\" class=\"elementor elementor-18138\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8a0bac7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"8a0bac7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d58d223\" data-id=\"d58d223\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f68ec75 elementor-widget elementor-widget-text-editor\" data-id=\"f68ec75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Scale Computing\u00a0<br \/><\/strong>Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore\u2122 technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve spent any time in the networking trenches, yo [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,421,61],"tags":[446,489,422],"class_list":["post-53916","post","type-post","status-publish","format-standard","hentry","category-488","category-scale-computing","category-press-release","tag-scale-computing-news","tag-489","tag-scale-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Edge In Depth: 5 Key Edge Computing Topologies - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scalecomputing.com\/blog\/p2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Edge In Depth: 5 Key Edge Computing Topologies - Version 2\" \/>\n<meta property=\"og:description\" content=\"If you\u2019ve spent any time in the networking trenches, yo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scalecomputing.com\/blog\/p2\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-01T01:33:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-19T07:18:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/edge-in-depth-5-key-edge-computing-topologies\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Edge In Depth: 5 Key Edge Computing Topologies\",\"datePublished\":\"2022-04-01T01:33:25+00:00\",\"dateModified\":\"2022-08-19T07:18:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/edge-in-depth-5-key-edge-computing-topologies\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scalecomputing.com\\\/imager\\\/images\\\/heros\\\/193478\\\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\",\"keywords\":[\"Scale Computing News\",\"2022\",\"Scale Computing\"],\"articleSection\":[\"2022\",\"Scale Computing\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/edge-in-depth-5-key-edge-computing-topologies\\\/\",\"url\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2\",\"name\":\"Edge In Depth: 5 Key Edge Computing Topologies - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scalecomputing.com\\\/imager\\\/images\\\/heros\\\/193478\\\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\",\"datePublished\":\"2022-04-01T01:33:25+00:00\",\"dateModified\":\"2022-08-19T07:18:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#primaryimage\",\"url\":\"https:\\\/\\\/www.scalecomputing.com\\\/imager\\\/images\\\/heros\\\/193478\\\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\",\"contentUrl\":\"https:\\\/\\\/www.scalecomputing.com\\\/imager\\\/images\\\/heros\\\/193478\\\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scalecomputing.com\\\/blog\\\/p2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Edge In Depth: 5 Key Edge Computing Topologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Edge In Depth: 5 Key Edge Computing Topologies - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scalecomputing.com\/blog\/p2","og_locale":"en_US","og_type":"article","og_title":"Edge In Depth: 5 Key Edge Computing Topologies - Version 2","og_description":"If you\u2019ve spent any time in the networking trenches, yo [&hellip;]","og_url":"https:\/\/www.scalecomputing.com\/blog\/p2","og_site_name":"Version 2","article_published_time":"2022-04-01T01:33:25+00:00","article_modified_time":"2022-08-19T07:18:36+00:00","og_image":[{"url":"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scalecomputing.com\/blog\/p2#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/edge-in-depth-5-key-edge-computing-topologies\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Edge In Depth: 5 Key Edge Computing Topologies","datePublished":"2022-04-01T01:33:25+00:00","dateModified":"2022-08-19T07:18:36+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/edge-in-depth-5-key-edge-computing-topologies\/"},"wordCount":517,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.scalecomputing.com\/blog\/p2#primaryimage"},"thumbnailUrl":"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png","keywords":["Scale Computing News","2022","Scale Computing"],"articleSection":["2022","Scale Computing","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/edge-in-depth-5-key-edge-computing-topologies\/","url":"https:\/\/www.scalecomputing.com\/blog\/p2","name":"Edge In Depth: 5 Key Edge Computing Topologies - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scalecomputing.com\/blog\/p2#primaryimage"},"image":{"@id":"https:\/\/www.scalecomputing.com\/blog\/p2#primaryimage"},"thumbnailUrl":"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png","datePublished":"2022-04-01T01:33:25+00:00","dateModified":"2022-08-19T07:18:36+00:00","breadcrumb":{"@id":"https:\/\/www.scalecomputing.com\/blog\/p2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scalecomputing.com\/blog\/p2"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scalecomputing.com\/blog\/p2#primaryimage","url":"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png","contentUrl":"https:\/\/www.scalecomputing.com\/imager\/images\/heros\/193478\/Edge_topologies_GG_1920x800_1d79351331e4f213556f5967b5f09254.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.scalecomputing.com\/blog\/p2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Edge In Depth: 5 Key Edge Computing Topologies"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-e1C","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=53916"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53916\/revisions"}],"predecessor-version":[{"id":53927,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53916\/revisions\/53927"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=53916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=53916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=53916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}