**7. Proof-of-concept**

To demonstrate the functionality of the Swarm Broker implementation, we have developed a use case applying the Swarm to a surveillance application, specifically the scenario described in the introduction of this article. To implement the scenario, we use the following services, also shown in **Figure 4**:


*Swarm Computing: The Emergence of a Collective Artificial Intelligence at the Edge… DOI: http://dx.doi.org/10.5772/intechopen.110907*

**Figure 4.**

*Finding Penny implementation using the Swarm.*


It is important to highlight that, Since the Swarm uses a service-oriented approach, the physical location of devices is not important, except for limiting the scope of the interactions. In our implementation, each service is implemented in a different device to exercise the decentralization principle of the Swarm. Thus, each device has exactly one application service, and one Swarm Broker, that supports the service interactions. The communication flow of this example is described below:

