rfc9556.original   rfc9556.txt 
Network Working Group J. Hong Internet Research Task Force (IRTF) J. Hong
Internet-Draft ETRI Request for Comments: 9556 ETRI
Intended status: Informational Y.-G. Hong Category: Informational Y-G. Hong
Expires: 18 March 2024 Daejeon University ISSN: 2070-1721 Daejeon University
X. de Foy X. de Foy
InterDigital Communications, LLC InterDigital Communications, LLC
M. Kovatsch M. Kovatsch
Huawei Technologies Duesseldorf GmbH Huawei Technologies Duesseldorf GmbH
E. Schooler E. Schooler
Intel University of Oxford
D. Kutscher D. Kutscher
Hong Kong University of Science and Technology (Guangzhou) HKUST(GZ)
15 September 2023 March 2024
IoT Edge Challenges and Functions Internet of Things (IoT) Edge Challenges and Functions
draft-irtf-t2trg-iot-edge-10
Abstract Abstract
Many Internet of Things (IoT) applications have requirements that Many Internet of Things (IoT) applications have requirements that
cannot be satisfied by traditional cloud-based systems (i.e., cloud cannot be satisfied by centralized cloud-based systems (i.e., cloud
computing). These include time sensitivity, data volume, computing). These include time sensitivity, data volume,
connectivity cost, operation in the face of intermittent services, connectivity cost, operation in the face of intermittent services,
privacy, and security. As a result, IoT is driving the Internet privacy, and security. As a result, IoT is driving the Internet
toward edge computing. This document outlines the requirements of toward edge computing. This document outlines the requirements of
the emerging IoT Edge and its challenges. It presents a general the emerging IoT edge and its challenges. It presents a general
model and major components of the IoT Edge to provide a common basis model and major components of the IoT edge to provide a common basis
for future discussions in the T2TRG and other IRTF and IETF groups. for future discussions in the Thing-to-Thing Research Group (T2TRG)
This document is a product of the IRTF Thing-to-Thing Research Group and other IRTF and IETF groups. This document is a product of the
(T2TRG). IRTF T2TRG.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This document is not an Internet Standards Track specification; it is
provisions of BCP 78 and BCP 79. published for informational purposes.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months This document is a product of the Internet Research Task Force
and may be updated, replaced, or obsoleted by other documents at any (IRTF). The IRTF publishes the results of Internet-related research
time. It is inappropriate to use Internet-Drafts as reference and development activities. These results might not be suitable for
material or to cite them other than as "work in progress." deployment. This RFC represents the consensus of the Thing-to-Thing
Research Group of the Internet Research Task Force (IRTF). Documents
approved for publication by the IRSG are not candidates for any level
of Internet Standard; see Section 2 of RFC 7841.
This Internet-Draft will expire on 18 March 2024. Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9556.
Copyright Notice Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction
2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Background
2.1. Internet of Things (IoT) . . . . . . . . . . . . . . . . 3 2.1. Internet of Things (IoT)
2.2. Cloud Computing . . . . . . . . . . . . . . . . . . . . . 4 2.2. Cloud Computing
2.3. Edge Computing . . . . . . . . . . . . . . . . . . . . . 4 2.3. Edge Computing
2.4. Examples of IoT Edge Computing Use Cases . . . . . . . . 6 2.4. Examples of IoT Edge Computing Use Cases
3. IoT Challenges Leading Towards Edge Computing . . . . . . . . 10 3. IoT Challenges Leading toward Edge Computing
3.1. Time Sensitivity . . . . . . . . . . . . . . . . . . . . 10 3.1. Time Sensitivity
3.2. Connectivity Cost . . . . . . . . . . . . . . . . . . . . 10 3.2. Connectivity Cost
3.3. Resilience to Intermittent Services . . . . . . . . . . . 11 3.3. Resilience to Intermittent Services
3.4. Privacy and Security . . . . . . . . . . . . . . . . . . 11 3.4. Privacy and Security
4. IoT Edge Computing Functions . . . . . . . . . . . . . . . . 11 4. IoT Edge Computing Functions
4.1. Overview of IoT Edge Computing Today . . . . . . . . . . 12 4.1. Overview of IoT Edge Computing
4.2. General Model . . . . . . . . . . . . . . . . . . . . . . 14 4.2. General Model
4.3. OAM Components . . . . . . . . . . . . . . . . . . . . . 17 4.3. OAM Components
4.3.1. Resource Discovery and Authentication . . . . . . . . 17 4.3.1. Resource Discovery and Authentication
4.3.2. Edge Organization and Federation . . . . . . . . . . 18 4.3.2. Edge Organization and Federation
4.3.3. Multi-Tenancy and Isolation . . . . . . . . . . . . . 19 4.3.3. Multi-Tenancy and Isolation
4.4. Functional Components . . . . . . . . . . . . . . . . . . 19 4.4. Functional Components
4.4.1. In-Network Computation . . . . . . . . . . . . . . . 19 4.4.1. In-Network Computation
4.4.2. Edge Storage and Caching . . . . . . . . . . . . . . 21 4.4.2. Edge Storage and Caching
4.4.3. Communication . . . . . . . . . . . . . . . . . . . . 21 4.4.3. Communication
4.5. Application Components . . . . . . . . . . . . . . . . . 22 4.5. Application Components
4.5.1. IoT Device Management . . . . . . . . . . . . . . . . 23 4.5.1. IoT Device Management
4.5.2. Data Management and Analytics . . . . . . . . . . . . 23 4.5.2. Data Management and Analytics
4.6. Simulation and Emulation Environments . . . . . . . . . . 24 4.6. Simulation and Emulation Environments
5. Security Considerations . . . . . . . . . . . . . . . . . . . 25 5. Security Considerations
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 25 6. Conclusion
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 26 7. IANA Considerations
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 26 8. Informative References
9. Informative References . . . . . . . . . . . . . . . . . . . 26 Acknowledgements
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 36 Authors' Addresses
1. Introduction 1. Introduction
Currently, many IoT services leverage cloud computing platforms, At the time of writing, many IoT services leverage cloud computing
because they provide virtually unlimited storage and processing platforms because they provide virtually unlimited storage and
power. The reliance of IoT on back-end cloud computing provides processing power. The reliance of IoT on back-end cloud computing
additional advantages such as scalability and efficiency. Today's provides additional advantages, such as scalability and efficiency.
IoT systems are fairly static with respect to integrating and At the time of writing, IoT systems are fairly static with respect to
supporting computation. It is not that there is no computation, but integrating and supporting computation. It is not that there is no
that systems are often limited to static configurations (edge computation, but that systems are often limited to static
gateways and cloud services). configurations (edge gateways and cloud services).
However, IoT devices generate large amounts of data at the edges of However, IoT devices generate large amounts of data at the edges of
the network. To meet IoT use case requirements, data is increasingly the network. To meet IoT use case requirements, data is increasingly
being stored, processed, analyzed, and acted upon close to the data being stored, processed, analyzed, and acted upon close to the data
sources. These requirements include time sensitivity, data volume, sources. These requirements include time sensitivity, data volume,
connectivity cost, and resiliency in the presence of intermittent connectivity cost, and resiliency in the presence of intermittent
connectivity, privacy, and security, which cannot be addressed by connectivity, privacy, and security, which cannot be addressed by
centralized cloud computing. A more flexible approach is necessary centralized cloud computing. A more flexible approach is necessary
to address these needs effectively. This involves distributing to address these needs effectively. This involves distributing
computing (and storage) and seamlessly integrating it into the edge- computing (and storage) and seamlessly integrating it into the edge-
cloud continuum. We refer to this integration of edge computing and cloud continuum. We refer to this integration of edge computing and
IoT as "IoT edge computing". This draft describes the related IoT as "IoT edge computing". This document describes the related
background, use cases, challenges, system models, and functional background, use cases, challenges, system models, and functional
components. components.
Owing to the dynamic nature of the IoT edge computing landscape, this Owing to the dynamic nature of the IoT edge computing landscape, this
document does not list existing projects in this field. Section 4.1 document does not list existing projects in this field. Section 4.1
presents a high-level overview of the field, based on a limited presents a high-level overview of the field based on a limited review
review of standards, research, open-source and proprietary products of standards, research, and open-source and proprietary products in
in [I-D.defoy-t2trg-iot-edge-computing-background]. [EDGE-COMPUTING-BACKGROUND].
This document represents the consensus of the Thing-to-Thing Research This document represents the consensus of the Thing-to-Thing Research
Group (T2TRG). It has been reviewed extensively by the Research Group (T2TRG). It has been reviewed extensively by the research
Group (RG) members who are actively involved in the research and group members who are actively involved in the research and
development of the technology covered by this document. It is not an development of the technology covered by this document. It is not an
IETF product and is not a standard. IETF product and is not a standard.
2. Background 2. Background
2.1. Internet of Things (IoT) 2.1. Internet of Things (IoT)
Since the term "Internet of Things" (IoT) was coined by Kevin Ashton Since the term "Internet of Things" was coined by Kevin Ashton in
in 1999 working on Radio-Frequency Identification (RFID) technology 1999 while working on Radio-Frequency Identification (RFID)
[Ashton], the concept of IoT has evolved. It now reflects a vision technology [Ashton], the concept of IoT has evolved. At the time of
of connecting the physical world to the virtual world of computers writing, it reflects a vision of connecting the physical world to the
using (often wireless) networks over which things can send and virtual world of computers using (often wireless) networks over which
receive information without human intervention. Recently, the term things can send and receive information without human intervention.
has become more literal by connecting things to the Internet and Recently, the term has become more literal by connecting things to
converging on Internet and Web technologies. the Internet and converging on Internet and web technologies.
A Thing is a physical item made available in the IoT, thereby A "Thing" is a physical item made available in the IoT, thereby
enabling digital interaction with the physical world for humans, enabling digital interaction with the physical world for humans,
services, and/or other Things ([I-D.irtf-t2trg-rest-iot]). In this services, and/or other Things [REST-IOT]. In this document, we will
document we will use the term "IoT device" to designate the embedded use the term "IoT device" to designate the embedded system attached
system attached to the Thing. to the Thing.
Resource-constrained Things such as sensors, home appliances and Resource-constrained Things, such as sensors, home appliances, and
wearable devices often have limited storage and processing power, wearable devices, often have limited storage and processing power,
which can provide challenges with respect to reliability, which can create challenges with respect to reliability, performance,
performance, energy consumption, security, and privacy [Lin]. Some, energy consumption, security, and privacy [Lin]. Some, less-
less resource-constrained Things, can generate a voluminous amount of resource-constrained Things, can generate a voluminous amount of
data. This range of factors led IoT designs that integrate Things data. This range of factors led to IoT designs that integrate Things
into larger distributed systems, for example edge or cloud computing into larger distributed systems, for example, edge or cloud computing
systems. systems.
2.2. Cloud Computing 2.2. Cloud Computing
Cloud computing has been defined in [NIST]: "cloud computing is a Cloud computing has been defined in [NIST]:
model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction". The low cost and massive availability of
storage and processing power enabled the realization of another
computing model, in which virtualized resources can be leased in an
on-demand fashion and be provided as general utilities. Platform-as-
a-Service and cloud computing platforms widely adopted this paradigm
for delivering services over the Internet, gaining both economical
and technical benefits [Botta].
Today, an unprecedented volume and variety of data is generated by | cloud computing is a model for enabling ubiquitous, convenient,
Things, and applications deployed at the network edge consume this | on-demand network access to a shared pool of configurable
data. In this context, cloud-based service models are not suitable | computing resources (e.g., networks, servers, storage,
for some classes of applications which require very short response | applications, and services) that can be rapidly provisioned and
times, access to local personal data, or generate vast amounts of | released with minimal management effort or service provider
data. These applications may instead leverage edge computing. | interaction.
The low cost and massive availability of storage and processing power
enabled the realization of another computing model in which
virtualized resources can be leased in an on-demand fashion and
provided as general utilities. Platform-as-a-Service (PaaS) and
cloud computing platforms widely adopted this paradigm for delivering
services over the Internet, gaining both economical and technical
benefits [Botta].
At the time of writing, an unprecedented volume and variety of data
is generated by Things, and applications deployed at the network edge
consume this data. In this context, cloud-based service models are
not suitable for some classes of applications that require very short
response times, require access to local personal data, or generate
vast amounts of data. These applications may instead leverage edge
computing.
2.3. Edge Computing 2.3. Edge Computing
Edge computing, also referred to as fog computing in some settings, Edge computing, also referred to as "fog computing" in some settings,
is a new paradigm in which substantial computing and storage is a new paradigm in which substantial computing and storage
resources are placed at the edge of the Internet, close to mobile resources are placed at the edge of the Internet, close to mobile
devices, sensors, actuators, or machines. Edge computing happens devices, sensors, actuators, or machines. Edge computing happens
near data sources [Mahadev], as well as close to where decisions are near data sources [Mahadev] as well as close to where decisions are
made or where interactions with the physical world take place made or where interactions with the physical world take place
("close" here can refer to a distance which is topological, physical, ("close" here can refer to a distance that is topological, physical,
latency-based, etc.). It processes both downstream data (originating latency-based, etc.). It processes both downstream data (originating
from cloud services) and upstream data (originating from end devices from cloud services) and upstream data (originating from end devices
or network elements). The term "fog computing" usually represents or network elements). The term "fog computing" usually represents
the notion of multi-tiered edge computing, that is, several layers of the notion of multi-tiered edge computing, that is, several layers of
compute infrastructure between end devices and cloud services. compute infrastructure between end devices and cloud services.
An edge device is any computing or networking resource residing An edge device is any computing or networking resource residing
between end-device data sources and cloud-based data centers. In between end-device data sources and cloud-based data centers. In
edge computing, end devices consume and produce data. At the network edge computing, end devices consume and produce data. At the network
edge, devices not only request services and information from the edge, devices not only request services and information from the
Cloud but also handle computing tasks including processing, storage, cloud but also handle computing tasks including processing, storing,
caching, and load balancing on data sent to and from the Cloud [Shi]. caching, and load balancing on data sent to and from the cloud [Shi].
This does not preclude end devices from hosting computation This does not preclude end devices from hosting computation
themselves, when possible, independently or as part of a distributed themselves, when possible, independently or as part of a distributed
edge computing platform. edge computing platform.
Several standards developing organization (SDO) and industry forums Several Standards Developing Organizations (SDOs) and industry forums
have provided definitions of edge and fog computing: have provided definitions of edge and fog computing:
* ISO defines edge computing as a "form of distributed computing in * ISO defines edge computing as a "form of distributed computing in
which significant processing and data storage takes place on nodes which significant processing and data storage takes place on nodes
which are at the edge of the network" [ISO_TR]. which are at the edge of the network" [ISO_TR].
* ETSI defines multi-access edge computing as a "system which * ETSI defines multi-access edge computing as a "system which
provides an IT service environment and cloud-computing provides an IT service environment and cloud-computing
capabilities at the edge of an access network which contains one capabilities at the edge of an access network which contains one
or more type of access technology, and in close proximity to its or more type of access technology, and in close proximity to its
users" [ETSI_MEC_01]. users" [ETSI_MEC_01].
* The Industry IoT Consortium (IIC, now incorporating what was * The Industry IoT Consortium (IIC) (now incorporating what was
formerly OpenFog) defines fog computing as "a horizontal, system- formerly OpenFog) defines fog computing as "a horizontal, system-
level architecture that distributes computing, storage, control level architecture that distributes computing, storage, control
and networking functions closer to the users along a cloud-to- and networking functions closer to the users along a cloud-to-
thing continuum" [OpenFog]. thing continuum" [OpenFog].
Based on these definitions, we can summarize a general philosophy of Based on these definitions, we can summarize a general philosophy of
edge computing as distributing the required functions close to users edge computing as distributing the required functions close to users
and data, while the difference to classic local systems is the usage and data, while the difference to classic local systems is the usage
of management and orchestration features adopted from cloud of management and orchestration features adopted from cloud
computing. computing.
Actors from various industries approach edge computing using Actors from various industries approach edge computing using
different terms and reference models although, in practice, these different terms and reference models, although, in practice, these
approaches are not incompatible and may integrate with each other: approaches are not incompatible and may integrate with each other:
* The telecommunication industry tends to use a model where edge * The telecommunication industry tends to use a model where edge
computing services are deployed over Network Function computing services are deployed over a Network Function
Virtualization (NFV) infrastructure, at aggregation points or in Virtualization (NFV) infrastructure, at aggregation points, or in
proximity to the user equipment (e.g., gNodeBs) [ETSI_MEC_03]. proximity to the user equipment (e.g., gNodeBs) [ETSI_MEC_03].
* Enterprise and campus solutions often interpret edge computing as * Enterprise and campus solutions often interpret edge computing as
an "edge cloud", that is, a smaller data center directly connected an "edge cloud", that is, a smaller data center directly connected
to the local network (often referred to as "on-premise"). to the local network (often referred to as "on-premise").
* The automation industry defines the edge as the connection point * The automation industry defines the edge as the connection point
between IT and OT (Operational Technology). Hence, edge computing between IT and Operational Technology (OT). Hence, edge computing
sometimes refers to applying IT solutions to OT problems, such as sometimes refers to applying IT solutions to OT problems, such as
analytics, more flexible user interfaces, or simply having more analytics, more-flexible user interfaces, or simply having more
computing power than an automation controller. computing power than an automation controller.
2.4. Examples of IoT Edge Computing Use Cases 2.4. Examples of IoT Edge Computing Use Cases
IoT edge computing can be used in home, industry, grid, healthcare, IoT edge computing can be used in home, industry, grid, healthcare,
city, transportation, agriculture, and/or educational scenarios. city, transportation, agriculture, and/or educational scenarios.
Here, we discuss only a few examples of such use cases, to identify Here, we discuss only a few examples of such use cases to identify
differentiating requirements, providing references to other use differentiating requirements, providing references to other use
cases. cases.
*Smart Factory* *Smart Factory*
As part of the Fourth Industrial Revolution, smart factories run
real-time processes based on IT technologies, such as artificial
intelligence and big data. Even a very small environmental change
in a smart factory can lead to a situation in which production
efficiency decreases or product quality problems occur.
Therefore, simple but time-sensitive processing can be performed
at the edge, for example, controlling the temperature and humidity
in the factory or operating machines based on the real-time
collection of the operational status of each machine. However,
data requiring highly precise analysis, such as machine life-cycle
management or accident risk prediction, can be transferred to a
central data center for processing.
As part of the 4th industrial revolution, smart factories run real- The use of edge computing in a smart factory can reduce the cost
time processes based on IT technologies, such as artificial of network and storage resources by reducing the communication
intelligence and big data. Even a very small environmental change in load to the central data center or server. It is also possible to
a smart factory can lead to a situation in which production improve process efficiency and facility asset productivity through
efficiency decreases or product quality problems occur. Therefore, real-time prediction of failures and to reduce the cost of failure
simple but time-sensitive processing can be performed at the edge, through preliminary measures. In the existing manufacturing
for example, controlling the temperature and humidity in the factory, field, production facilities are manually run according to a
or operating machines based on the real-time collection of the program entered in advance; however, edge computing in a smart
operational status of each machine. However, data requiring highly factory enables tailoring solutions by analyzing data at each
precise analysis, such as machine lifecycle management or accident production facility and machine level. Digital twins [Jones] of
risk prediction, can be transferred to a central data center for IoT devices have been jointly used with edge computing in
processing. industrial IoT scenarios [Chen].
The use of edge computing in a smart factory can reduce the cost of
network and storage resources by reducing the communication load to
the central data center or server. It is also possible to improve
process efficiency and facility asset productivity through real-time
prediction of failures and to reduce the cost of failure through
preliminary measures. In the existing manufacturing field,
production facilities are manually run according to a program entered
in advance; however, edge computing in a smart factory enables
tailoring solutions by analyzing data at each production facility and
machine level. Digital twins [Jones] of IoT devices have been
jointly used with edge computing in industrial IoT scenarios [Chen].
*Smart Grid* *Smart Grid*
In future smart-city scenarios, the smart grid will be critical in
In future smart city scenarios, the Smart Grid will be critical in ensuring highly available/efficient energy control in city-wide
ensuring highly available/efficient energy control in city-wide electricity management. Edge computing is expected to play a
electricity management. Edge computing is expected to play a significant role in these systems to improve the transmission
significant role in these systems to improve the transmission efficiency of electricity, to react to and restore power after a
efficiency of electricity, to react to, and restore power after a disturbance, to reduce operation costs, and to reuse energy
disturbance, to reduce operation costs, and to reuse energy effectively since these operations involve local decision-making.
effectively, since these operations involve local decision-making. In addition, edge computing can help monitor power generation and
In addition, edge computing can help monitor power generation and power demand and make local electrical energy storage decisions in
power demand, and make local electrical energy storage decisions in smart grid systems.
smart grid systems.
*Smart Agriculture* *Smart Agriculture*
Smart agriculture integrates information and communication
technologies with farming technology. Intelligent farms use IoT
technology to measure and analyze parameters, such as the
temperature, humidity, sunlight, carbon dioxide, and soil quality,
in crop cultivation facilities. Depending on the analysis
results, control devices are used to set the environmental
parameters to an appropriate state. Remote management is also
possible through mobile devices, such as smartphones.
Smart agriculture integrates information and communication In existing farms, simple systems, such as management according to
technologies with farming technology. Intelligent farms use IoT temperature and humidity, can be easily and inexpensively
technology to measure and analyze parameters, such as the implemented using IoT technology. Field sensors gather data on
temperature, humidity, sunlight, carbon dioxide, and soil quality, in field and crop condition. This data is then transmitted to cloud
crop cultivation facilities. Depending on the analysis results, servers that process data and recommend actions. The use of edge
control devices are used to set the environmental parameters to an computing can reduce the volume of back-and-forth data
appropriate state. Remote management is also possible through mobile transmissions significantly, resulting in cost and bandwidth
devices such as smartphones. savings. Locally generated data can be processed at the edge, and
local computing and analytics can drive local actions. With edge
In existing farms, simple systems such as management according to computing, it is easy for farmers to select large amounts of data
temperature and humidity can be easily and inexpensively implemented for processing, and data can be analyzed even in remote areas with
using IoT technology. Field sensors gather data on field and crop poor access conditions. Other applications include enabling
condition. This data is then transmitted to cloud servers that dashboarding, for example, to visualize the farm status, as well
process data and recommend actions. The use of edge computing can as enhancing Extended Reality (XR) applications that require edge
reduce the volume of back-and-forth data transmissions significantly, audio/video processing. As the number of people working on
resulting in cost and bandwidth savings. Locally generated data can farming has been decreasing over time, increasing automation
be processed at the edge, and local computing and analytics can drive enabled by edge computing can be a driving force for future smart
local actions. With edge computing, it is easy for farmers to select agriculture.
large amounts of data for processing, and data can be analyzed even
in remote areas with poor access conditions. Other applications
include enabling dashboarding, for example, to visualize the farm
status, as well as enhancing Extended Reality (XR) applications that
require edge audio/video processing. As the number of people working
on farming has been decreasing over time, increasing automation
enabled by edge computing can be a driving force for future smart
agriculture.
*Smart Construction* *Smart Construction*
Safety is critical at construction sites. Every year, many
construction workers lose their lives because of falls,
collisions, electric shocks, and other accidents. Therefore,
solutions have been developed to improve construction site safety,
including the real-time identification of workers, monitoring of
equipment location, and predictive accident prevention. To deploy
these solutions, many cameras and IoT sensors have been installed
on construction sites to measure noise, vibration, gas
concentration, etc. Typically, the data generated from these
measurements is collected in on-site gateways and sent to remote
cloud servers for storage and analysis. Thus, an inspector can
check the information stored on the cloud server to investigate an
incident. However, this approach can be expensive because of
transmission costs (for example, of video streams over a mobile
network connection) and because usage fees of private cloud
services.
Safety is critical at construction sites. Every year, many Using edge computing, data generated at the construction site can
construction workers lose their lives because of falls, collisions, be processed and analyzed on an edge server located within or near
electric shocks, and other accidents. Therefore, solutions have been the site. Only the result of this processing needs to be
developed to improve construction site safety, including the real- transferred to a cloud server, thus reducing transmission costs.
time identification of workers, monitoring of equipment location, and It is also possible to locally generate warnings to prevent
predictive accident prevention. To deploy these solutions, many accidents in real time.
cameras and IoT sensors have been installed on construction sites, to
measure noise, vibration, gas concentration, etc. Typically, the
data generated from these measurements is collected in on-site
gateways and sent to remote cloud servers for storage and analysis.
Thus, an inspector can check the information stored on the cloud
server to investigate an incident. However, this approach can be
expensive because of transmission costs, for example, of video
streams over a mobile network connection, and because usage fees of
private cloud services.
Using edge computing, data generated at the construction site can be
processed and analyzed on an edge server located within or near the
site. Only the result of this processing needs to be transferred to
a cloud server, thus reducing transmission costs. It is also
possible to locally generate warnings to prevent accidents in real-
time.
*Self-Driving Car* *Self-Driving Car*
Edge computing plays a crucial role in safety-focused self-driving
car systems. With a multitude of sensors, such as high-resolution
cameras, radars, Light Detection and Ranging (LiDAR), sonar
sensors, and GPS systems, autonomous vehicles generate vast
amounts of real-time data. Local processing utilizing edge
computing nodes allows for efficient collection and analysis of
this data to monitor vehicle distances and road conditions and
respond promptly to unexpected situations. Roadside computing
nodes can also be leveraged to offload tasks when necessary, for
example, when the local processing capacity of the car is
insufficient because of hardware constraints or a large data
volume.
Edge computing plays a crucial role in safety-focused self-driving For instance, when the car ahead slows, a self-driving car adjusts
car systems. With a multitude of sensors, such as high-resolution its speed to maintain a safe distance, or when a roadside signal
cameras, radar, LIDAR, sonar sensors, and GPS systems, autonomous changes, it adapts its behavior accordingly. In another example,
vehicles generate vast amounts of real-time data. Local processing cars equipped with self-parking features utilize local processing
utilizing edge computing nodes allows for efficient collection and to analyze sensor data, determine suitable parking spots, and
analysis of this data to monitor vehicle distances and road execute precise parking maneuvers without relying on external
conditions and respond promptly to unexpected situations. Roadside processing or connectivity. It is also possible to use in-cabin
computing nodes can also be leveraged to offload tasks when cameras coupled with local processing to monitor the driver's
necessary, for example, when the local processing capacity of the car attention level and detect signs of drowsiness or distraction.
is insufficient because of hardware constraints or a large data The system can issue warnings or implement preventive measures to
volume. ensure driver safety.
For instance, when the car ahead slows, a self-driving car adjusts
its speed to maintain a safe distance, or when a roadside signal
changes, it adapts its behavior accordingly. In another example,
cars equipped with self-parking features utilize local processing to
analyze sensor data, determine suitable parking spots, and execute
precise parking maneuvers without relying on external processing or
connectivity. It is also possible to use in-cabin cameras coupled
with local processing to monitor the driver's attention level and
detect signs of drowsiness or distraction. The system can issue
warnings or implement preventive measures to ensure driver safety.
Edge computing empowers self-driving cars by enabling real-time Edge computing empowers self-driving cars by enabling real-time
processing, reducing latency, enhancing data privacy, and optimizing processing, reducing latency, enhancing data privacy, and
bandwidth usage. By leveraging local processing capabilities, self- optimizing bandwidth usage. By leveraging local processing
driving cars can make rapid decisions, adapt to changing capabilities, self-driving cars can make rapid decisions, adapt to
environments, and ensure safer and more efficient autonomous driving changing environments, and ensure safer and more efficient
experiences. autonomous driving experiences.
*Digital Twin* *Digital Twin*
A digital twin can simulate different scenarios and predict
outcomes based on real-time data collected from the physical
environment. This simulation capability empowers proactive
maintenance, optimization of operations, and the prediction of
potential issues or failures. Decision makers can use digital
twins to test and validate different strategies, identify
inefficiencies, and optimize performance.
A digital twin can simulate different scenarios and predict outcomes With edge computing, real-time data is collected, processed, and
based on real-time data collected from the physical environment. analyzed directly at the edge, allowing for the accurate
This simulation capability empowers proactive maintenance, monitoring and simulation of physical assets. Moreover, edge
optimization of operations, and the prediction of potential issues or computing effectively minimizes latency, enabling rapid responses
failures. Decision makers can use digital twins to test and validate to dynamic conditions as computational resources are brought
different strategies, identify inefficiencies, and optimize closer to the physical object. Running digital twin processing at
performance. the edge enables organizations to obtain timely insights and make
informed decisions that maximize efficiency and performance.
With edge computing, real-time data is collected, processed, and
analyzed directly at the edge, allowing for the accurate monitoring
and simulation of physical assets. Moreover, edge computing
effectively minimizes latency, enabling rapid responses to dynamic
conditions as computational resources are brought closer to the
physical object. Running digital twin processing at the edge enables
organizations to obtain timely insights and make informed decisions
that maximize efficiency and performance.
*Other Use Cases* *Other Use Cases*
Artificial intelligence (AI) / machine learning (ML) systems at
the edge empower real-time analysis, faster decision-making,
reduced latency, improved operational efficiency, and personalized
experiences across various industries by bringing AI and ML
capabilities closer to edge devices.
AI/ML systems at the edge empower real-time analysis, faster In addition, oneM2M has studied several IoT edge computing use
decision-making, reduced latency, improved operational efficiency, cases, which are documented in [oneM2M-TR0001], [oneM2M-TR0018],
and personalized experiences across various industries, by bringing and [oneM2M-TR0026]. The edge-computing-related requirements
artificial intelligence and machine learning capabilities closer to raised through the analysis of these use cases are captured in
edge devices. [oneM2M-TS0002].
In addition, oneM2M has studied several IoT edge computing use cases,
which are documented in [oneM2M-TR0001], [oneM2M-TR0018] and
[oneM2M-TR0026]. The edge computing related requirements raised
through the analysis of these use cases are captured in
[oneM2M-TS0002].
3. IoT Challenges Leading Towards Edge Computing 3. IoT Challenges Leading toward Edge Computing
This section describes the challenges faced by IoT that are This section describes the challenges faced by the IoT that are
motivating the adoption of edge computing. These are distinct from motivating the adoption of edge computing. These are distinct from
the research challenges applicable to IoT edge computing, some of the research challenges applicable to IoT edge computing, some of
which are mentioned in Section 4. which are mentioned in Section 4.
IoT technology is used with increasingly demanding applications, for IoT technology is used with increasingly demanding applications in
example, in industrial, automotive and healthcare domains, leading to domains such as industrial, automotive, and healthcare, which leads
new challenges. For example, industrial machines such as laser to new challenges. For example, industrial machines, such as laser
cutters produce over 1 terabyte of data per hour, and similar amounts cutters, produce over 1 terabyte of data per hour, and similar
can be generated in autonomous cars [NVIDIA]. 90% of IoT data is amounts can be generated in autonomous cars [NVIDIA]. 90% of IoT
expected to be stored, processed, analyzed, and acted upon close to data is expected to be stored, processed, analyzed, and acted upon
the source [Kelly], as cloud computing models alone cannot address close to the source [Kelly], as cloud computing models alone cannot
these new challenges [Chiang]. address these new challenges [Chiang].
Below, we discuss IoT use case requirements that are moving cloud Below, we discuss IoT use case requirements that are moving cloud
capabilities to be more proximate, distributed, and disaggregated. capabilities to be more proximate, distributed, and disaggregated.
3.1. Time Sensitivity 3.1. Time Sensitivity
Many industrial control systems, such as manufacturing systems, smart Often, many industrial control systems, such as manufacturing
grids, and oil and gas systems often require stringent end-to-end systems, smart grids, and oil and gas systems, require stringent end-
latency between the sensor and control nodes. While some IoT to-end latency between the sensor and control nodes. While some IoT
applications may require latency below a few tens of milliseconds applications may require latency below a few tens of milliseconds
[Weiner], industrial robots and motion control systems have use cases [Weiner], industrial robots and motion control systems have use cases
for cycle times in the order of microseconds [_60802]. In some for cycle times in the order of microseconds [IEC_IEEE_60802]. In
cases, speed-of-light limitations may simply prevent a cloud-based some cases, speed-of-light limitations may simply prevent cloud-based
solutions; however, this is not the only challenge relative to time solutions; however, this is not the only challenge relative to time
sensitivity. Guarantees for bounded latency and jitter ([RFC8578] sensitivity. Guarantees for bounded latency and jitter ([RFC8578],
section 7) are also important for industrial IoT applications. This Section 7) are also important for industrial IoT applications. This
means that control packets must arrive with as little variation as means that control packets must arrive with as little variation as
possible and within a strict deadline. Given the best-effort possible and within a strict deadline. Given the best-effort
characteristics of the Internet, this challenge is virtually characteristics of the Internet, this challenge is virtually
impossible to address, without using end-to-end guarantees for impossible to address without using end-to-end guarantees for
individual message delivery and continuous data flows. individual message delivery and continuous data flows.
3.2. Connectivity Cost 3.2. Connectivity Cost
Some IoT deployments may not face bandwidth constraints when Some IoT deployments may not face bandwidth constraints when
uploading data to the Cloud. 5G and Wi-Fi 6 networks both uploading data to the cloud. Theoretically, both 5G and Wi-Fi 6
theoretically top out at 10 gigabits per second (i.e., 4.5 terabytes networks top out at 10 gigabits per second (i.e., 4.5 terabytes per
per hour), allowing to transfer large amounts of uplink data. hour), allowing the transfer of large amounts of uplink data.
However, the cost of maintaining continuous high-bandwidth However, the cost of maintaining continuous high-bandwidth
connectivity for such usage is unjustifiable and impractical for most connectivity for such usage is unjustifiable and impractical for most
IoT applications. In some settings, for example, in aeronautical IoT applications. In some settings, for example, in aeronautical
communication, higher communication costs reduce the amount of data communication, higher communication costs reduce the amount of data
that can be practically uploaded even further. Minimizing reliance that can be practically uploaded even further. Therefore, minimizing
on high-bandwidth connectivity is therefore a requirement, for reliance on high-bandwidth connectivity is a requirement; this can be
example, by processing data at the edge and deriving summarized or done, for example, by processing data at the edge and deriving
actionable insights that can be transmitted to the Cloud. summarized or actionable insights that can be transmitted to the
cloud.
3.3. Resilience to Intermittent Services 3.3. Resilience to Intermittent Services
Many IoT devices, such as sensors, actuators, and controllers, have Many IoT devices, such as sensors, actuators, and controllers, have
very limited hardware resources and cannot rely solely on their own very limited hardware resources and cannot rely solely on their own
resources to meet their computing and/or storage needs. They require resources to meet their computing and/or storage needs. They require
reliable, uninterrupted, or resilient services to augment their reliable, uninterrupted, or resilient services to augment their
capabilities to fulfill their application tasks. This is difficult capabilities to fulfill their application tasks. This is difficult
and partly impossible to achieve using cloud services for systems and partly impossible to achieve using cloud services for systems
such as vehicles, drones, or oil rigs that have intermittent network such as vehicles, drones, or oil rigs that have intermittent network
connectivity. Conversely, a cloud back-end might want to device data connectivity. Conversely, a cloud backend might want to device data
even if it is currently asleep. even if it is currently asleep.
3.4. Privacy and Security 3.4. Privacy and Security
When IoT services are deployed at home, personal information can be When IoT services are deployed at home, personal information can be
learned from detected usage data. For example, one can extract learned from detected usage data. For example, one can extract
information about employment, family status, age, and income by information about employment, family status, age, and income by
analyzing smart-meter data [ENERGY]. Policy makers have begun to analyzing smart meter data [ENERGY]. Policy makers have begun to
provide frameworks that limit the usage of personal data and impose provide frameworks that limit the usage of personal data and impose
strict requirements on data controllers and processors. Data stored strict requirements on data controllers and processors. Data stored
indefinitely in the Cloud also increases the risk of data leakage, indefinitely in the cloud also increases the risk of data leakage,
for instance, through attacks on rich targets. for instance, through attacks on rich targets.
It is often argues that industrial systems do not provide privacy It is often argued that industrial systems do not provide privacy
implications, as no personal data is gathered. However, data from implications, as no personal data is gathered. However, data from
such systems is often highly sensitive, as one might be able to infer such systems is often highly sensitive, as one might be able to infer
trade secrets such as the setup of production lines. Hence, owners trade secrets, such as the setup of production lines. Hence, owners
of these systems are generally reluctant to upload IoT data to the of these systems are generally reluctant to upload IoT data to the
Cloud. cloud.
Furthermore, passive observers can perform traffic analysis on Furthermore, passive observers can perform traffic analysis on
device-to-cloud paths. Therefore, hiding traffic patterns associated device-to-cloud paths. Therefore, hiding traffic patterns associated
with sensor networks can be another requirement for edge computing. with sensor networks can be another requirement for edge computing.
4. IoT Edge Computing Functions 4. IoT Edge Computing Functions
We first look at the current state of IoT edge computing We first look at the current state of IoT edge computing
(Section 4.1), and then define a general system model (Section 4.2). (Section 4.1) and then define a general system model (Section 4.2).
This provides a context for IoT edge-computing functions, which are This provides a context for IoT edge computing functions, which are
listed in Section 4.3, Section 4.4 and Section 4.5. listed in Sections 4.3, 4.4, and 4.5.
4.1. Overview of IoT Edge Computing Today 4.1. Overview of IoT Edge Computing
This section provides an overview of today's IoT edge computing field This section provides an overview of the current (at the time of
based on a limited review of standards, research, open-source and writing) IoT edge computing field based on a limited review of
proprietary products in standards, research, and open-source and proprietary products in
[I-D.defoy-t2trg-iot-edge-computing-background]. [EDGE-COMPUTING-BACKGROUND].
IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) IoT gateways, both open-source (such as EdgeX Foundry or Home Edge)
and proprietary products, represent a common class of IoT edge- and proprietary products, represent a common class of IoT edge
computing products, where the gateway provides a local service on computing products, where the gateway provides a local service on
customer premises and is remotely managed through a cloud service. customer premises and is remotely managed through a cloud service.
IoT communication protocols are typically used between IoT devices IoT communication protocols are typically used between IoT devices
and the gateway, including CoAP [RFC7252], MQTT [mqtt5], and many and the gateway, including a Constrained Application Protocol (CoAP)
specialized IoT protocols (such as OPC UA and DDS in the Industrial [RFC7252], Message Queuing Telemetry Transport (MQTT) [MQTT5], and
IoT space), while the gateway communicates with the distant cloud many specialized IoT protocols (such as Open Platform Communications
typically using HTTPS. Virtualization platforms enable the Unified Architecture (OPC UA) and Data Distribution Service (DDS) in
deployment of virtual edge computing functions (using VMs and the industrial IoT space), while the gateway communicates with the
application containers), including IoT gateway software, on servers distant cloud typically using HTTPS. Virtualization platforms enable
in the mobile network infrastructure (at base stations and the deployment of virtual edge computing functions (using Virtual
concentration points), edge data centers (in central offices), and Machines (VMs) and application containers), including IoT gateway
regional data centers located near central offices. End devices are software, on servers in the mobile network infrastructure (at base
envisioned to become computing devices in forward-looking projects, stations and concentration points), edge data centers (in central
but are not commonly used today. offices), and regional data centers located near central offices.
End devices are envisioned to become computing devices in forward-
looking projects but are not commonly used at the time of writing.
In addition to open-source and proprietary solutions, a horizontal In addition to open-source and proprietary solutions, a horizontal
IoT service layer is standardized by the oneM2M standards body to IoT service layer is standardized by the oneM2M standards body to
reduce fragmentation, increase interoperability and promote reuse in reduce fragmentation, increase interoperability, and promote reuse in
the IoT ecosystem. Furthermore, ETSI MEC developed an IoT API the IoT ecosystem. Furthermore, ETSI Multi-access Edge Computing
[ETSI_MEC_33] that enables the deployment of heterogeneous IoT (MEC) developed an IoT API [ETSI_MEC_33] that enables the deployment
platforms and provides a means to configure the various components of of heterogeneous IoT platforms and provides a means to configure the
an IoT system. various components of an IoT system.
Physical or virtual IoT gateways can host application programs that Physical or virtual IoT gateways can host application programs that
are typically built using an SDK to access local services through a are typically built using an SDK to access local services through a
programmatic API. Edge cloud system operators host their customers' programmatic API. Edge cloud system operators host their customers'
application VMs or containers on servers located in or near access application VMs or containers on servers located in or near access
networks that can implement local edge services. For example, mobile networks that can implement local edge services. For example, mobile
networks can provide edge services for radio-network information, networks can provide edge services for radio network information,
location, and bandwidth management. location, and bandwidth management.
Resilience in the IoT can entail the ability to operate autonomously Resilience in the IoT can entail the ability to operate autonomously
in periods of disconnectedness to preserve the integrity and safety in periods of disconnectedness to preserve the integrity and safety
of the controlled system, possibly in a degraded mode. IoT devices of the controlled system, possibly in a degraded mode. IoT devices
and gateways are often expected to operate in always-on and and gateways are often expected to operate in always-on and
unattended modes, using fault detection and unassisted recovery unattended modes, using fault detection and unassisted recovery
functions. functions.
The life cycle management of services and applications on physical The life-cycle management of services and applications on physical
IoT gateways is generally cloud-based. Edge cloud management IoT gateways is generally cloud based. Edge cloud management
platforms and products (such as StarlingX, Akraino Edge Stack, or platforms and products (such as StarlingX, Akraino Edge Stack, or
proprietary products from major Cloud providers) adapt cloud proprietary products from major cloud providers) adapt cloud
management technologies (e.g., Kubernetes) to the edge cloud, that management technologies (e.g., Kubernetes) to the edge cloud, that
is, to smaller, distributed computing devices running outside a is, to smaller, distributed computing devices running outside a
controlled data center. The service and application life-cycle is controlled data center. Typically, the service and application life
typically using an NFV-like management and orchestration model. cycle is using an NFV-like management and orchestration model.
The platform typically enables advertising or consuming services The platform generally enables advertising or consuming services
hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports
service discovery and communication), and enables communication with service discovery and communication), and enables communication with
local and remote endpoints (e.g., message routing function in IoT local and remote endpoints (e.g., message routing function in IoT
gateways). The platform is typically extensible to edge applications gateways). The platform is usually extensible to edge applications
because it can advertise a service that other edge applications can because it can advertise a service that other edge applications can
consume. The IoT communication services include protocol consume. The IoT communication services include protocol
translation, analytics, and transcoding. Communication between edge- translation, analytics, and transcoding. Communication between edge
computing devices is enabled in tiered or distributed deployments. computing devices is enabled in tiered or distributed deployments.
An edge cloud platform may enable pass-through without storage or An edge cloud platform may enable pass-through without storage or
local storage (e.g., on IoT gateways). Some edge cloud platforms use local storage (e.g., on IoT gateways). Some edge cloud platforms use
distributed storage such as that provided by a distributed storage distributed storage such as that provided by a distributed storage
platform (e.g., EdgeFS, Ceph), or, in more experimental settings, by platform (e.g., EdgeFS and Ceph) or, in more experimental settings,
an ICN network, for example, systems such as Chipmunk [chipmunk] and by an Information-Centric Networking (ICN) network, for example,
Kua [kua] have been proposed as distributed information-centric systems such as Chipmunk [Chipmunk] and Kua [Kua] have been proposed
objects stores. External storage, for example, on databases in as distributed information-centric objects stores. External storage,
distant or local IT cloud, is typically used for filtered data deemed for example, on databases in a distant or local IT cloud, is
worthy of long-term storage, although in some cases it may be for all typically used for filtered data deemed worthy of long-term storage;
data, for example when required for regulatory reasons. although, in some cases, it may be for all data, for example, when
required for regulatory reasons.
Stateful computing is supported on platforms that host native Stateful computing is the default on most systems, VMs, and
programs, VMs, or containers. Stateless computing is supported on containers. Stateless computing is supported on platforms providing
platforms providing a "serverless computing" service (also known as a "serverless computing" service (also known as function-as-
function-as-a-service, e.g., using stateless containers), or on a-service, e.g., using stateless containers) or on systems based on
systems based on named function networking. named function networking.
In many IoT use cases, a typical network usage pattern is a high In many IoT use cases, a typical network usage pattern is a high-
volume uplink with some form of traffic reduction enabled by volume uplink with some form of traffic reduction enabled by
processing over edge-computing devices. Alternatives to traffic processing over edge computing devices. Alternatives to traffic
reduction include deferred transmission (to off-peak hours or using reduction include deferred transmission (to off-peak hours or using
physical shipping). Downlink traffic includes application control physical shipping). Downlink traffic includes application control
and software updates. Downlink-heavy traffic patterns are not and software updates. Downlink-heavy traffic patterns are not
excluded but are more often associated with non-IoT usage (e.g., excluded but are more often associated with non-IoT usage (e.g.,
video CDNs). video Content Delivery Networks (CDNs)).
4.2. General Model 4.2. General Model
Edge computing is expected to play an important role in deploying new Edge computing is expected to play an important role in deploying new
IoT services integrated with Big Data and AI enabled by flexible in- IoT services integrated with big data and AI enabled by flexible in-
network computing platforms. Although there are many approaches to network computing platforms. Although there are many approaches to
edge computing, in this section, we attempt to lay out a general edge computing, this section lays out an attempt at a general model
model and the list associated logical functions. In practice, this and lists associated logical functions. In practice, this model can
model can be mapped to different architectures, such as: be mapped to different architectures, such as:
* A single IoT gateway, or a hierarchy of IoT gateways, typically * A single IoT gateway, or a hierarchy of IoT gateways, typically
connected to the cloud (e.g., to extend the traditional cloud- connected to the cloud (e.g., to extend the centralized cloud-
based management of IoT devices and data to the edge). The IoT based management of IoT devices and data to the edge). The IoT
gateway plays a common role in providing access to a heterogeneous gateway plays a common role in providing access to a heterogeneous
set of IoT devices/sensors, handling IoT data, and delivering IoT set of IoT devices/sensors, handling IoT data, and delivering IoT
data to its final destination in a cloud network. Whereas an IoT data to its final destination in a cloud network. An IoT gateway
gateway requires interactions with the cloud, it can also operate requires interactions with the cloud; however, it can also operate
independently in a disconnected mode. independently in a disconnected mode.
* A set of distributed computing nodes, for example, embedded in * A set of distributed computing nodes, for example, embedded in
switches, routers, edge cloud servers, or mobile devices. Some switches, routers, edge cloud servers, or mobile devices. Some
IoT devices have sufficient computing capabilities to participate IoT devices have sufficient computing capabilities to participate
in such distributed systems owing to advances in hardware in such distributed systems owing to advances in hardware
technology. In this model, edge-computing nodes can collaborate technology. In this model, edge computing nodes can collaborate
to share resources. to share resources.
* A hybrid system involving both IoT gateways and supporting * A hybrid system involving both IoT gateways and supporting
functions in distributed computing nodes. functions in distributed computing nodes.
In the general model described in Figure 1, the edge computing domain In the general model described in Figure 1, the edge computing domain
is interconnected with IoT devices (southbound connectivity), is interconnected with IoT devices (southbound connectivity),
possibly with a remote/cloud network (northbound connectivity), and possibly with a remote/cloud network (northbound connectivity), and
with a service operator's system. Edge-computing nodes provide with a service operator's system. Edge computing nodes provide
multiple logical functions or components that may not be present in a multiple logical functions or components that may not be present in a
given system. They may be implemented in a centralized or given system. They may be implemented in a centralized or
distributed fashion, at the network edge, or through interworking distributed fashion, at the network edge, or through interworking
between the edge network and remote cloud networks. between the edge network and remote cloud networks.
+---------------------+ +---------------------+
| Remote network | +---------------+ | Remote Network | +---------------+
|(e.g., cloud network)| | Service | |(e.g., cloud network)| | Service |
+-----------+---------+ | Operator | +-----------+---------+ | Operator |
| +------+--------+ | +------+--------+
| | | |
+--------------+-------------------+-----------+ +--------------+-------------------+-----------+
| Edge Computing Domain | | Edge Computing Domain |
| | | |
| One or more Computing Nodes | | One or more computing nodes |
| (IoT gateway, end devices, switches, | | (IoT gateway, end devices, switches, |
| routers, mini/micro-data centers, etc.) | | routers, mini/micro-data centers, etc.) |
| | | |
| OAM Components | | OAM Components |
| - Resource Discovery and Authentication | | - Resource Discovery and Authentication |
| - Edge Organization and Federation | | - Edge Organization and Federation |
| - Multi-Tenancy and Isolation | | - Multi-Tenancy and Isolation |
| - ... | | - ... |
| | | |
| Functional Components | | Functional Components |
skipping to change at page 15, line 39 skipping to change at line 682
| - ... | | - ... |
| | | |
| Application Components | | Application Components |
| - IoT Devices Management | | - IoT Devices Management |
| - Data Management and Analytics | | - Data Management and Analytics |
| - ... | | - ... |
| | | |
+------+--------------+-------- - - - -+- - - -+ +------+--------------+-------- - - - -+- - - -+
| | | | | | | | | |
| | +-----+--+ | | +-----+--+
+----+---+ +-----+--+ | |compute | | +----+---+ +-----+--+ | |Compute | |
| End | | End | ... |node/end| | End | | End | ... |Node/End|
|Device 1| |Device 2| ...| |device n| | |Device 1| |Device 2| ...| |Device n| |
+--------+ +--------+ +--------+ +--------+ +--------+ +--------+
+ - - - - - - - -+ + - - - - - - - -+
Figure 1: Model of IoT Edge Computing Figure 1: Model of IoT Edge Computing
In the distributed model described in Figure 2, the edge-computing In the distributed model described in Figure 2, the edge computing
domain is composed of IoT edge gateways and IoT devices which are domain is composed of IoT edge gateways and IoT devices that are also
also used as computing nodes. Edge computing domains are connected used as computing nodes. Edge computing domains are connected to a
to a remote/cloud network and their respective service operator's remote/cloud network and their respective service operator's system.
system. IoT devices/computing nodes provide logical functions, for IoT devices/computing nodes provide logical functions, for example,
example as part of distributed machine learning or distributed image as part of distributed machine learning or distributed image
processing applications. The processing capabilities in IoT devices processing applications. The processing capabilities in IoT devices
are limited; they require the support of other nodes, and in a are limited; they require the support of other nodes. In a
distributed machine learning application, the training process for AI distributed machine learning application, the training process for AI
services can be executed at IoT edge gateways or cloud networks and services can be executed at IoT edge gateways or cloud networks, and
the prediction (inference) service is executed in the IoT devices. the prediction (inference) service is executed in the IoT devices.
In a distributed image processing application, some image processing Similarly, in a distributed image processing application, some image
functions can be similarly executed at the edge or in the cloud, processing functions can be executed at the edge or in the cloud. To
while preprocessing, which helps limiting the amount of uploaded limit the amount of data to be uploaded to central cloud functions,
data, is performed by the IoT device. IoT edge devices may pre-process data.
+----------------------------------------------+ +----------------------------------------------+
| Edge Computing Domain | | Edge Computing Domain |
| | | |
| +--------+ +--------+ +--------+ | | +--------+ +--------+ +--------+ |
| |Compute | |Compute | |Compute | | | |Compute | |Compute | |Compute | |
| |node/End| |node/End| .... |node/End| | | |Node/End| |Node/End| .... |Node/End| |
| |device 1| |device 2| .... |device m| | | |Device 1| |Device 2| .... |Device m| |
| +----+---+ +----+---+ +----+---+ | | +----+---+ +----+---+ +----+---+ |
| | | | | | | | | |
| +---+-------------+-----------------+--+ | | +---+-------------+-----------------+--+ |
| | IoT Edge Gateway | | | | IoT Edge Gateway | |
| +-----------+-------------------+------+ | | +-----------+-------------------+------+ |
| | | | | | | |
+--------------+-------------------+-----------+ +--------------+-------------------+-----------+
| | | |
+-----------+---------+ +------+-------+ +-----------+---------+ +------+-------+
| Remote network | | Service | | Remote Network | | Service |
|(e.g., cloud network)| | Operator(s) | |(e.g., cloud network)| | Operator(s) |
+-----------+---------+ +------+-------+ +-----------+---------+ +------+-------+
| | | |
+--------------+-------------------+-----------+ +--------------+-------------------+-----------+
| | | | | | | |
| +-----------+-------------------+------+ | | +-----------+-------------------+------+ |
| | IoT Edge Gateway | | | | IoT Edge Gateway | |
| +---+-------------+-----------------+--+ | | +---+-------------+-----------------+--+ |
| | | | | | | | | |
| +----+---+ +----+---+ +----+---+ | | +----+---+ +----+---+ +----+---+ |
| |Compute | |Compute | |Compute | | | |Compute | |Compute | |Compute | |
| |node/End| |node/End| .... |node/End| | | |Node/End| |Node/End| .... |Node/End| |
| |device 1| |device 2| .... |device n| | | |Device 1| |Device 2| .... |Device n| |
| +--------+ +--------+ +--------+ | | +--------+ +--------+ +--------+ |
| | | |
| Edge Computing Domain | | Edge Computing Domain |
+----------------------------------------------+ +----------------------------------------------+
Figure 2: Example: Machine Learning over a Distributed IoT Edge Figure 2: Example of Machine Learning over a Distributed IoT Edge
Computing System Computing System
In the following, we enumerate major edge computing domain In the following, we enumerate major edge computing domain
components. They are here loosely organized into OAM (Operations, components. Here, they are loosely organized into Operations,
Administration, and Maintenance), functional, and application Administration, and Maintenance (OAM); functional; and application
components, with the understanding that the distinction between these components, with the understanding that the distinction between these
classes may not always be clear, depending on actual system classes may not always be clear, depending on actual system
architectures. Some representative research challenges are architectures. Some representative research challenges are
associated with those functions. We used input from co-authors, IRTF associated with those functions. We used input from coauthors,
attendees, and some comprehensive reviews of the field ([Yousefpour], participants of T2TRG meetings, and some comprehensive reviews of the
[Zhang2], [Khan]). field ([Yousefpour], [Zhang2], and [Khan]).
4.3. OAM Components 4.3. OAM Components
Edge computing OAM extends beyond the network-related OAM functions Edge computing OAM extends beyond the network-related OAM functions
listed in [RFC6291]. In addition to infrastructure (network, listed in [RFC6291]. In addition to infrastructure (network,
storage, and computing resources), edge computing systems can also storage, and computing resources), edge computing systems can also
include computing environments (for VMs, software containers, include computing environments (for VMs, software containers, and
functions), IoT devices, data, and code. functions), IoT devices, data, and code.
Operation-related functions include performance monitoring for Operation-related functions include performance monitoring for
service-level agreement measurements, fault management and Service Level Agreement (SLA) measurements, fault management, and
provisioning for links, nodes, compute and storage resources, provisioning for links, nodes, compute and storage resources,
platforms, and services. Administration covers network/compute/ platforms, and services. Administration covers network/compute/
storage resources, platforms and services discovery, configuration, storage resources, platform and service discovery, configuration, and
and planning. Discovery during normal operation (e.g., discovery of planning. Discovery during normal operation (e.g., discovery of
compute or storage nodes by endpoints) is typically not included in compute or storage nodes by endpoints) is typically not included in
OAM; however, in this document, we do not address it separately. OAM; however, in this document, we do not address it separately.
Management covers the monitoring and diagnostics of failures, as well Management covers the monitoring and diagnostics of failures, as well
as means to minimize their occurrence and take corrective actions. as means to minimize their occurrence and take corrective actions.
This may include software update management and high service This may include software update management and high service
availability through redundancy and multipath communication. availability through redundancy and multipath communication.
Centralized (e.g., SDN) and decentralized management systems can be Centralized (e.g., Software-Defined Networking (SDN)) and
used. Finally, we arbitrarily chose to address data management as an decentralized management systems can be used. Finally, we
application component, however, in some systems, data management may arbitrarily chose to address data management as an application
be considered similar to a network management function. component; however, in some systems, data management may be
considered similar to a network management function.
We further detail a few relevant OAM components. We further detail a few relevant OAM components.
4.3.1. Resource Discovery and Authentication 4.3.1. Resource Discovery and Authentication
Discovery and authentication may target platforms and , Discovery and authentication may target platforms and infrastructure
infrastructure resources, such as computing, networking, and storage, resources, such as computing, networking, and storage, as well as
as well as other resources such as IoT devices, sensors, data, code other resources, such as IoT devices, sensors, data, code units,
units, services, applications, and users interacting with the system. services, applications, and users interacting with the system. In a
Broker-based solutions can be used, for example, using an IoT gateway broker-based system, an IoT gateway can act as a broker to discover
as a broker to discover IoT resources. More decentralized solutions IoT resources. More decentralized solutions can also be used in
can also be used in replacement or complement, for example, CoAP replacement of or in complement to the broker-based solutions; for
enables multicast discovery of an IoT device, and CoAP service example, CoAP enables multicast discovery of an IoT device and CoAP
discovery enables obtaining a list of resources made available by service discovery enables one to obtain a list of resources made
this device [RFC7252]. For device authentication, current available by this device [RFC7252]. For device authentication,
centralized gateway-based systems rely on the installation of a current centralized gateway-based systems rely on the installation of
secret on IoT devices and computing devices (e.g., a device a secret on IoT devices and computing devices (e.g., a device
certificate stored in a hardware security module, or a combination of certificate stored in a hardware security module or a combination of
code and data stored in a trusted execution environment). code and data stored in a trusted execution environment).
Related challenges include: Related challenges include:
* Discovery, authentication, and trust establishment between IoT * Discovery, authentication, and trust establishment between IoT
devices, compute nodes, and platforms, with regard to concerns devices, compute nodes, and platforms, with regard to concerns
such as mobility, heterogeneous devices and networks, scale, such as mobility, heterogeneous devices and networks, scale,
multiple trust domains, constrained devices, anonymity, and multiple trust domains, constrained devices, anonymity, and
traceability. traceability.
* Intermittent connectivity to the Internet, removing the need to * Intermittent connectivity to the Internet, removing the need to
rely on a third-party authority [Echeverria]. rely on a third-party authority [Echeverria].
* Resiliency to failure [Harchol], denial of service attacks, easier * Resiliency to failure [Harchol], denial-of-service attacks, and
physical access for attackers. easier physical access for attackers.
4.3.2. Edge Organization and Federation 4.3.2. Edge Organization and Federation
In a distributed system context, once edge devices have discovered In a distributed system context, once edge devices have discovered
and authenticated each other, they can be organized, or self- and authenticated each other, they can be organized or self-organized
organized, into hierarchies or clusters. The organizational into hierarchies or clusters. The organizational structure may range
structure may range from centralized to peer-to-peer, or it may be from centralized to peer-to-peer, or it may be closely tied to other
closely tied to other systems. Such groups can also form federations systems. Such groups can also form federations with other edges or
with other edges or with remote clouds. with remote clouds.
Related challenges include: Related challenges include:
* Support for scaling, and enabling fault-tolerance or self-healing * Support for scaling and enabling fault tolerance or self-healing
[Jeong]. In addition to using a hierarchical organization to cope [Jeong]. In addition to using a hierarchical organization to cope
with scaling, another available and possibly complementary with scaling, another available and possibly complementary
mechanism is multicast ([RFC7390] [I-D.ietf-core-groupcomm-bis]). mechanism is multicast [RFC7390] [CORE-GROUPCOMM-BIS]. Other
Other approaches include relying on blockchains [Ali]. approaches include relying on blockchains [Ali].
* Integration of edge computing with virtualized Radio Access * Integration of edge computing with virtualized Radio Access
Networks (Fog RAN) [I-D.bernardos-sfc-fog-ran] and 5G access Networks (Fog RAN) [SFC-FOG-RAN] and 5G access networks.
networks.
* Sharing resources in multi-vendor/operator scenarios, to optimize * Sharing resources in multi-vendor/operator scenarios to optimize
criteria such as profit [Anglano], resource usage, latency, and criteria such as profit [Anglano], resource usage, latency, and
energy consumption. energy consumption.
* Capacity planning, placement of infrastructure nodes to minimize * Capacity planning, placement of infrastructure nodes to minimize
delay [Fan], cost, energy, etc. delay [Fan], cost, energy, etc.
* Incentives for participation, for example, in peer-to-peer * Incentives for participation, for example, in peer-to-peer
federation schemes. federation schemes.
* Design of federated AI over IoT edge computing systems [Brecko], * Design of federated AI over IoT edge computing systems [Brecko],
for example, for anomaly detection. for example, for anomaly detection.
4.3.3. Multi-Tenancy and Isolation 4.3.3. Multi-Tenancy and Isolation
Some IoT edge computing systems make use of virtualized (compute, Some IoT edge computing systems make use of virtualized (compute,
storage and networking) resources to address the need for secure storage, and networking) resources to address the need for secure
multi-tenancy at the edge. This leads to "edge clouds" that share multi-tenancy at the edge. This leads to "edge clouds" that share
properties with remotes clouds and can reuse some of their properties with remote clouds and can reuse some of their ecosystems.
ecosystems. Virtualization function management is largely covered by Virtualization function management is largely covered by ETSI NFV and
ETSI NFV and MEC standards and recommendations. Projects such as MEC standards and recommendations. Projects such as [LFEDGE-EVE]
[LFEDGE-EVE] further cover virtualization and its management in further cover virtualization and its management in distributed edge
distributed edge-computing settings. computing settings.
Related challenges include: Related challenges include:
* Adapting cloud management platforms to the edge, to account for * Adapting cloud management platforms to the edge to account for its
its distributed nature, e.g., using Conflict-free Replicated Data distributed nature, heterogeneity, need for customization, and
Types (CRDT) [Jeffery], heterogeneity and customization, e.g., limited resources (for example, using Conflict-free Replicated
using intent-based management mechanisms [Cao], and limited Data Types (CRDTs) [Jeffery] or intent-based management mechanisms
resources. [Cao]).
* Minimizing virtual function instantiation time and resource usage. * Minimizing virtual function instantiation time and resource usage.
4.4. Functional Components 4.4. Functional Components
4.4.1. In-Network Computation 4.4.1. In-Network Computation
A core function of IoT edge computing is to enable local computation A core function of IoT edge computing is to enable local computation
on a node at the network edge, typically for application-layer on a node at the network edge, typically for application-layer
processing, such as processing input data from sensors, making local processing, such as processing input data from sensors, making local
decisions, preprocessing data, offloading computation on behalf of a decisions, preprocessing data, and offloading computation on behalf
device, service, or user. Related functions include orchestrating of a device, service, or user. Related functions include
computation (in a centralized or distributed manner) and managing orchestrating computation (in a centralized or distributed manner)
application lifecycles. Support for in-network computation may vary and managing application life cycles. Support for in-network
in terms of capability, for example, computing nodes can host virtual computation may vary in terms of capability; for example, computing
machines, software containers, software actors, uni-kernels running nodes can host virtual machines, software containers, software
stateful or stateless code, or a rule engine providing an API to actors, unikernels running stateful or stateless code, or a rule
register actions in response to conditions such as IoT device ID, engine providing an API to register actions in response to conditions
sensor values to check, thresholds, etc. (such as an IoT device ID, sensor values to check, thresholds, etc.).
Edge offloading includes offloading to and from an IoT device, and to Edge offloading includes offloading to and from an IoT device and to
and from a network node. [Cloudlets] offer an example of offloading and from a network node. [Cloudlets] describes an example of
computation from an end device to a network node. In contrast, offloading computation from an end device to a network node. In
oneM2M is an example of a system that allows a cloud-based IoT contrast, oneM2M is an example of a system that allows a cloud-based
platform to transfer resources and tasks to a target edge node IoT platform to transfer resources and tasks to a target edge node
[oneM2M-TR0052]. Once transferred, the edge node can directly [oneM2M-TR0052]. Once transferred, the edge node can directly
support IoT devices that it serves with the service offloaded by the support IoT devices that it serves with the service offloaded by the
cloud (e.g., group management, location management, etc.). cloud (e.g., group management, location management, etc.).
QoS can be provided in some systems through the combination of QoS can be provided in some systems through the combination of
network QoS (e.g., traffic engineering or wireless resource network QoS (e.g., traffic engineering or wireless resource
scheduling) and compute/storage resource allocations. For example, scheduling) and compute/storage resource allocations. For example,
in some systems, a bandwidth manager service can be exposed to enable in some systems, a bandwidth manager service can be exposed to enable
allocation of the bandwidth to/from an edge-computing application allocation of the bandwidth to/from an edge computing application
instance. instance.
In-network computation can leverage the underlying services, provided In-network computation can leverage the underlying services provided
using data generated by IoT devices and access networks. Such using data generated by IoT devices and access networks. Such
services include IoT device location, radio network information, services include IoT device location, radio network information,
bandwidth management and congestion management (e.g., the congestion bandwidth management, and congestion management (e.g., the congestion
management feature of oneM2M [oneM2M-TR0052]). management feature of oneM2M [oneM2M-TR0052]).
Related challenges include: Related challenges include:
* (Computation placement) Selecting, in a centralized or * Computation placement: in a centralized or distributed/peer-to-
distributed/peer-to-peer manner, an appropriate compute device peer manner, selecting an appropriate compute device. The
based on available resources, location of data input and data selection is based on available resources, location of data input
sinks, compute node properties, etc., and with varying goals and data sinks, compute node properties, etc. with varying goals.
including end-to-end latency, privacy, high availability, energy These goals include end-to-end latency, privacy, high
conservation, or network efficiency, for example, using load- availability, energy conservation, or network efficiency (for
balancing techniques to avoid congestion. example, using load-balancing techniques to avoid congestion).
* Onboarding code on a platform or computing device, and invoking * Onboarding code on a platform or computing device and invoking
remote code execution, possibly as part of a distributed remote code execution, possibly as part of a distributed
programming model and with respect to similar concerns of latency, programming model and with respect to similar concerns of latency,
privacy, etc.: For example, offloading can be included in a privacy, etc. For example, offloading can be included in a
vehicular scenario [Grewe]. These operations should deal with vehicular scenario [Grewe]. These operations should deal with
heterogeneous compute nodes [Schafer], and may also support end heterogeneous compute nodes [Schafer] and may also support end
devices, including IoT devices, as compute nodes [Larrea]. devices, including IoT devices, as compute nodes [Larrea].
* Adapting Quality of Results (QoR) for applications where a perfect * Adapting Quality of Results (QoR) for applications where a perfect
result is not necessary [Li]. result is not necessary [Li].
* Assisted or automatic partitioning of code: for example, for * Assisted or automatic partitioning of code. For example, for
application programs [I-D.sarathchandra-coin-appcentres] or application programs [COIN-APPCENTRES] or network programs
network programs [I-D.hsingh-coinrg-reqs-p4comp]. [REQS-P4COMP].
* Supporting computation across trust domains: for example, * Supporting computation across trust domains. For example,
verifying computation results. verifying computation results.
* Support for computation mobility: relocating an instance from one * Supporting computation mobility: relocating an instance from one
compute node to another, while maintaining a given service level; compute node to another while maintaining a given service level;
session continuity when communicating with end devices that are session continuity when communicating with end devices that are
mobile, possibly at high speed (e.g., in vehicular scenarios); mobile, possibly at high speed (e.g., in vehicular scenarios);
defining lightweight execution environments for secure code defining lightweight execution environments for secure code
mobility, for example, using WebAssembly [Nieke]. mobility, for example, using WebAssembly [Nieke].
* Defining, managing, and verifying Service Level Agreements (SLA) * Defining, managing, and verifying SLAs for edge computing systems;
for edge-computing systems: pricing is a challenging task. pricing is a challenging task.
4.4.2. Edge Storage and Caching 4.4.2. Edge Storage and Caching
Local storage or caching enables local data processing (e.g., Local storage or caching enables local data processing (e.g.,
preprocessing or analysis) as well as delayed data transfer to the preprocessing or analysis) as well as delayed data transfer to the
cloud or delayed physical shipping. An edge node may offer local cloud or delayed physical shipping. An edge node may offer local
data storage (in which persistence is subject to retention policies), data storage (in which persistence is subject to retention policies),
caching, or both. Caching generally refers to temporary storage to caching, or both. Generally, "caching" refers to temporary storage
improve performance without persistence guarantees. An edge-caching to improve performance without persistence guarantees. An edge-
component manages data persistence, for example, it schedules the caching component manages data persistence; for example, it schedules
removal of data when it is no longer needed. Other related aspects the removal of data when it is no longer needed. Other related
include the authentication and encryption of data. Edge storage and aspects include the authentication and encryption of data. Edge
caching can take the form of a distributed storage systems. storage and caching can take the form of a distributed storage
system.
Related challenges include: Related challenges include:
* (Cache and data placement) Using cache positioning and data * Cache and data placement: using cache positioning and data
placement strategies to minimize data retrieval delay [Liu] and placement strategies to minimize data retrieval delay [Liu] and
energy consumption. Caches may be positioned in the access energy consumption. Caches may be positioned in the access-
network infrastructure or on end devices. network infrastructure or on end devices.
* Maintaining consistency, freshness, reliability, and privacy of * Maintaining consistency, freshness, reliability, and privacy of
stored/cached data in systems that are distributed, constrained, stored/cached data in systems that are distributed, constrained,
and dynamic (e.g., owing to end devices and computing nodes churn and dynamic (e.g., due to node mobility, energy-saving regimes,
or mobility), and which can have additional data governance and disruptions) and which can have additional data governance
constraints on data storage location. For example, [Mortazavi] constraints on data storage location. For example, [Mortazavi]
leverages a hierarchical storage organization. Freshness-related describes leveraging a hierarchical storage organization.
metrics include the age of information [Yates] that captures the Freshness-related metrics include the age of information [Yates]
timeliness of information received from a sender (e.g., an IoT that captures the timeliness of information received from a sender
device). (e.g., an IoT device).
4.4.3. Communication 4.4.3. Communication
An edge cloud may provide a northbound data plane or management plane An edge cloud may provide a northbound data plane or management plane
interface to a remote network, such as a cloud, home or enterprise interface to a remote network, such as a cloud, home, or enterprise
network. This interface does not exist in stand-alone (local-only) network. This interface does not exist in stand-alone (local-only)
scenarios. To support such an interface when it exists, an edge scenarios. To support such an interface when it exists, an edge
computing component needs to expose an API, deal with authentication computing component needs to expose an API, deal with authentication
and authorization, and support secure communication. and authorization, and support secure communication.
An edge cloud may provide an API or interface to local or mobile An edge cloud may provide an API or interface to local or mobile
users, for example, to provide access to services and applications, users, for example, to provide access to services and applications or
or to manage data published by local/mobile devices. to manage data published by local/mobile devices.
Edge-computing nodes communicate with IoT devices over a southbound Edge computing nodes communicate with IoT devices over a southbound
interface, typically for data acquisition and IoT device management. interface, typically for data acquisition and IoT device management.
Communication brokering is a typical function of IoT edge computing Communication brokering is a typical function of IoT edge computing
that facilitates communication with IoT devices, enabling clients to that facilitates communication with IoT devices, enables clients to
register as recipients for data from devices, as well as forwarding/ register as recipients for data from devices, forwards traffic to or
routing of traffic to or from IoT devices, enabling various data from IoT devices, enables various data discovery and redistribution
discovery and redistribution patterns, for example, north-south with patterns (for example, north-south with clouds and east-west with
clouds, east-west with other edge devices other edge devices [EDGE-DATA-DISCOVERY-OVERVIEW]). Another related
[I-D.mcbride-edge-data-discovery-overview]. Another related aspect aspect is dispatching alerts and notifications to interested
is dispatching alerts and notifications to interested consumers both consumers both inside and outside the edge computing domain.
inside and outside the edge-computing domain. Protocol translation, Protocol translation, analytics, and video transcoding can also be
analytics, and video transcoding can also be performed when performed when necessary. Communication brokering may be centralized
necessary. Communication brokering may be centralized in some in some systems, for example, using a hub-and-spoke message broker or
systems, for example, using a hub-and-spoke message broker, or
distributed with message buses, possibly in a layered bus approach. distributed with message buses, possibly in a layered bus approach.
Distributed systems can leverage direct communication between end Distributed systems can leverage direct communication between end
devices over device-to-device links. A broker can ensure devices over device-to-device links. A broker can ensure
communication reliability and traceability and, in some cases, communication reliability and traceability and, in some cases,
transaction management. transaction management.
Related challenges include: Related challenges include:
* Defining edge computing abstractions, such as PaaS [Yangui], * Defining edge computing abstractions, such as PaaS [Yangui],
suitable for users and cloud systems to interact with edge suitable for users and cloud systems to interact with edge
computing systems and dealing with interoperability issues such as computing systems and dealing with interoperability issues, such
data model heterogeneity. as data-model heterogeneity.
* Enabling secure and resilient communication between IoT devices * Enabling secure and resilient communication between IoT devices
and remote cloud, for example, through multipath support. and a remote cloud, for example, through multipath support.
4.5. Application Components 4.5. Application Components
IoT edge computing can host applications, such as those mentioned in IoT edge computing can host applications, such as those mentioned in
Section 2.4. While describing the components of individual Section 2.4. While describing the components of individual
applications is out of our scope, some of those applications share applications is out of our scope, some of those applications share
similar functions, such as IoT device management and data management, similar functions, such as IoT device management and data management,
as described below. as described below.
4.5.1. IoT Device Management 4.5.1. IoT Device Management
IoT device management includes managing information regarding IoT IoT device management includes managing information regarding IoT
devices, including their sensors, and how to communicate with them. devices, including their sensors and how to communicate with them.
Edge computing addresses the scalability challenges of a large number Edge computing addresses the scalability challenges of a large number
of IoT devices by separating the scalability domain into edge/local of IoT devices by separating the scalability domain into edge/local
networks and remote networks. For example, in the context of the networks and remote networks. For example, in the context of the
oneM2M standard, a device management functionality (called "software oneM2M standard, a device management functionality (called "software
campaign" in oneM2M) enables the installation, deletion, activation, campaign" in oneM2M) enables the installation, deletion, activation,
and deactivation of software functions/services on a potentially and deactivation of software functions/services on a potentially
large number of edge nodes [oneM2M-TR0052]. Using a dashboard or large number of edge nodes [oneM2M-TR0052]. Using a dashboard or
management software, a service provider issues these requests through management software, a service provider issues these requests through
an IoT cloud platform supporting the software campaign functionality. an IoT cloud platform supporting the software campaign functionality.
Challenges listed in Section 4.3.1 may be applicable to IoT devices The challenges listed in Section 4.3.1 may be applicable to IoT
management as well. device management as well.
4.5.2. Data Management and Analytics 4.5.2. Data Management and Analytics
Data storage and processing at the edge are major aspects of IoT edge Data storage and processing at the edge are major aspects of IoT edge
computing, directly addressing the high-level IoT challenges listed computing, directly addressing the high-level IoT challenges listed
in Section 3. Data analysis, for example, through AI/ML tasks in Section 3. Data analysis, for example, through AI/ML tasks
performed at the edge, may benefit from specialized hardware support performed at the edge, may benefit from specialized hardware support
on the computing nodes. on the computing nodes.
Related challenges include: Related challenges include:
* Addressing concerns regarding resource usage, security, and * Addressing concerns regarding resource usage, security, and
privacy when sharing, processing, discovering, or managing data: privacy when sharing, processing, discovering, or managing data:
for example presenting data in views composed of an aggregation of for example, presenting data in views composed of an aggregation
related data [Zhang]; protecting data communication between of related data [Zhang], protecting data communication between
authenticated peers [Basudan], classifying data (e.g., in terms of authenticated peers [Basudan], classifying data (e.g., in terms of
privacy, importance, validity), and compressing and encrypting privacy, importance, and validity), and compressing and encrypting
data, for example, using homomorphic encryption to directly data, for example, using homomorphic encryption to directly
process encrypted data [Stanciu]. process encrypted data [Stanciu].
* Other concerns regarding edge data discovery (e.g., streaming * Other concerns regarding edge data discovery (e.g., streaming
data, metadata, and events) include siloization and lack of data, metadata, and events) include siloization and lack of
standards in edge environments that can be dynamic (e.g., standards in edge environments that can be dynamic (e.g.,
vehicular networks) and heterogeneous vehicular networks) and heterogeneous
[I-D.mcbride-edge-data-discovery-overview]. [EDGE-DATA-DISCOVERY-OVERVIEW].
* Data-driven programming models [Renart], for example, event-based, * Data-driven programming models [Renart], for example, those that
including handling naming and data abstractions. are event based, including handling naming and data abstractions.
* Data integration in an environment that without data * Data integration in an environment without data standardization or
standardization, or where different sources use different where different sources use different ontologies
ontologies [Farnbauer-Schmidt]. [Farnbauer-Schmidt].
* Addressing concerns such as limited resources, privacy, dynamic, * Addressing concerns such as limited resources, privacy, and
and heterogeneous environments to deploy machine learning at the dynamic and heterogeneous environments to deploy machine learning
edge: for example, making machine learning more lightweight and at the edge: for example, making machine learning more lightweight
distributed (e.g., enabling distributed inference at the edge), and distributed (e.g., enabling distributed inference at the
supporting shorter training times and simplified models, and edge), supporting shorter training times and simplified models,
supporting models that can be compressed for efficient and supporting models that can be compressed for efficient
communication [Murshed]. communication [Murshed].
* Although edge computing can support IoT services independently of * Although edge computing can support IoT services independently of
cloud computing, it can also be connected to cloud computing. cloud computing, it can also be connected to cloud computing.
Thus, the relationship between IoT edge computing and cloud Thus, the relationship between IoT edge computing and cloud
computing, with regard to data management, is another potential computing, with regard to data management, is another potential
challenge [ISO_TR]. challenge [ISO_TR].
4.6. Simulation and Emulation Environments 4.6. Simulation and Emulation Environments
IoT Edge Computing introduces new challenges to the simulation and IoT edge computing introduces new challenges to the simulation and
emulation tools used by researchers and developers. A varied set of emulation tools used by researchers and developers. A varied set of
applications, networks, and computing technologies can coexist in a applications, networks, and computing technologies can coexist in a
distributed system, making modeling difficult. Scale, mobility, and distributed system, making modeling difficult. Scale, mobility, and
resource management are additional challenges [SimulatingFog]. resource management are additional challenges [SimulatingFog].
Tools include simulators, where simplified application logic runs on Tools include simulators, where simplified application logic runs on
top of a fog network model, and emulators, where actual applications top of a fog network model, and emulators, where actual applications
can be deployed, typically in software containers, over a cloud can be deployed, typically in software containers, over a cloud
infrastructure (e.g., Docker and Kubernetes) running over a network infrastructure (e.g., Docker and Kubernetes) running over a network
emulating network edge conditions such as variable delays, throughput emulating network edge conditions, such as variable delays,
and mobility events. To gain in scale, emulated and simulated throughput, and mobility events. To gain in scale, emulated and
systems can be used together in hybrid federation-based approaches simulated systems can be used together in hybrid federation-based
[PseudoDynamicTesting], whereas to gain in realism, physical devices approaches [PseudoDynamicTesting]; whereas to gain in realism,
can be interconnected with emulated systems. Examples of related physical devices can be interconnected with emulated systems.
work and platforms include the publicly accessible MEC sandbox work Examples of related work and platforms include the publicly
recently initiated in ETSI [ETSI_Sandbox], and open source simulators accessible MEC sandbox work recently initiated in ETSI [ETSI_Sandbox]
and emulators ([AdvantEDGE] emulator and tools cited in and open-source simulators and emulators ([AdvantEDGE] emulator and
[SimulatingFog]). EdgeNet [Senel] is a globally distributed edge tools cited in [SimulatingFog]). EdgeNet [Senel] is a globally
cloud for Internet researchers, using nodes contributed by distributed edge cloud for Internet researchers, which uses nodes
institutions, and based on Docker for containerization and Kubernetes contributed by institutions and which is based on Docker for
for deployment and node management. containerization and Kubernetes for deployment and node management.
Digital twins are virtual instances of a physical system (twin) that Digital twins are virtual instances of a physical system (twin) that
are continually updated with the latter's performance, maintenance, are continually updated with the latter's performance, maintenance,
and health status data throughout the life cycle of the physical and health status data throughout the life cycle of the physical
system. [Madni]. In contrast to a traditional emulation or system [Madni]. In contrast to an emulation or simulated
simulated environment, digital twins, once generated, are maintained environment, digital twins, once generated, are maintained in sync by
in sync by their physical twin, which can be, among many other their physical twin, which can be, among many other instances, an IoT
instances, an IoT device, edge device, an edge network. The benefits device, edge device, or an edge network. The benefits of digital
of digital twins go beyond those of emulation and include accelerated twins go beyond those of emulation and include accelerated business
business processes, enhanced productivity, and faster innovation with processes, enhanced productivity, and faster innovation with reduced
reduced costs [I-D.irtf-nmrg-network-digital-twin-arch]. costs [NETWORK-DIGITAL-TWIN-ARCH].
5. Security Considerations 5. Security Considerations
Privacy and security are drivers of the adoption of edge computing Privacy and security are drivers of the adoption of edge computing
for the IoT (Section 3.4). As discussed in Section 4.3.1, for the IoT (Section 3.4). As discussed in Section 4.3.1,
authentication and trust (among computing nodes, management nodes, authentication and trust (among computing nodes, management nodes,
and end devices) can be challenging as scale, mobility, and and end devices) can be challenging as scale, mobility, and
heterogeneity increase. The sometimes disconnected nature of edge heterogeneity increase. The sometimes disconnected nature of edge
resources can avoid reliance on third-party authorities. Distributed resources can avoid reliance on third-party authorities. Distributed
edge computing is exposed reliability and denial of service attacks. edge computing is exposed to reliability and denial-of-service
Personal or proprietary IoT data leakage is also a major threat, attacks. A personal or proprietary IoT data leakage is also a major
particularly because of the distributed nature of the systems threat, particularly because of the distributed nature of the systems
(Section 4.5.2). Furthermore, blockchain-based distributed IoT edge (Section 4.5.2). Furthermore, blockchain-based distributed IoT edge
computing must be designed for privacy, since public blockchain computing must be designed for privacy, since public blockchain
addressing does not guarantee absolute anonymity [Ali]. addressing does not guarantee absolute anonymity [Ali].
However, edge computing also offers solutions in the security space: However, edge computing also offers solutions in the security space:
maintaining privacy by computing sensitive data closer to data maintaining privacy by computing sensitive data closer to data
generators is a major use case for IoT edge computing. An edge cloud generators is a major use case for IoT edge computing. An edge cloud
can be used to perform actions based on sensitive data or to can be used to perform actions based on sensitive data or to
anonymize or aggregate data prior to transmission to a remote cloud anonymize or aggregate data prior to transmission to a remote cloud
server. Edge computing communication brokering functions can also be server. Edge computing communication brokering functions can also be
used to secure communication between edge and cloud networks. used to secure communication between edge and cloud networks.
6. Conclusion 6. Conclusion
IoT edge computing plays an essential role, complementary to the IoT edge computing plays an essential role, complementary to the
cloud, in enabling IoT systems in certain situations. In this cloud, in enabling IoT systems in certain situations. In this
document, we presented use cases and listing the core challenges document, we presented use cases and listed the core challenges faced
faced by IoT that drive the need for IoT edge computing. The first by the IoT that drive the need for IoT edge computing. Therefore,
part of this document may therefore help focus future research the first part of this document may help focus future research
efforts on the aspects of IoT edge computing where it is most useful. efforts on the aspects of IoT edge computing where it is most useful.
The second part of this document presents a general system model and The second part of this document presents a general system model and
structured overview of the associated research challenges and related structured overview of the associated research challenges and related
work. The structure, based on the system model, is not meant to be work. The structure, based on the system model, is not meant to be
restrictive and exists for the purpose of having a link between restrictive and exists for the purpose of having a link between
individual research areas and where they are applicable in an IoT individual research areas and where they are applicable in an IoT
edge computing system. edge computing system.
7. IANA Considerations 7. IANA Considerations
This document has no IANA actions. This document has no IANA actions.
8. Acknowledgements 8. Informative References
The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel
Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-
José Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed,
JaeSeung Song, Roberto Morabito, Carsten Bormann and Ari Keränen for
their valuable comments and suggestions on this document.
9. Informative References
[AdvantEDGE] [AdvantEDGE]
"Mobile Edge Emulation Platform", Source Code Repository, "AdvantEDGE, Mobile Edge Emulation Platform", commit
2020, <https://github.com/InterDigitalInc/AdvantEDGE>. 8f6edbe, May 2023,
<https://github.com/InterDigitalInc/AdvantEDGE>.
[Ali] Ali, M. S., Vecchio, M., and F. Antonelli, "Enabling a [Ali] Ali, M., Vecchio, M., and F. Antonelli, "Enabling a
Blockchain-Based IoT Edge", IEEE Internet of Things Blockchain-Based IoT Edge", IEEE Internet of Things
Magazine pp. 24-29, DOI 10.1109/IOTM.2019.1800024, 2018, Magazine, vol. 1, no.2, pp. 24-29,
DOI 10.1109/IOTM.2019.1800024, December 2018,
<https://doi.org/10.1109/IOTM.2019.1800024>. <https://doi.org/10.1109/IOTM.2019.1800024>.
[Anglano] Anglano, C., Canonico, M., Castagno, P., Guazzone, M., and [Anglano] Anglano, C., Canonico, M., Castagno, P., Guazzone, M., and
M. Sereno, "A game-theoretic approach to coalition M. Sereno, "A game-theoretic approach to coalition
formation in fog provider federations", 2018 Third formation in fog provider federations", 2018 Third
International Conference on Fog and Mobile Edge International Conference on Fog and Mobile Edge Computing
Computing (FMEC), DOI 10.1109/fmec.2018.8364054, April (FMEC), DOI 10.1109/fmec.2018.8364054, April 2018,
2018, <https://doi.org/10.1109/fmec.2018.8364054>. <https://doi.org/10.1109/fmec.2018.8364054>.
[Ashton] Ashton, K., "That Internet of Things thing", RFID J. vol. [Ashton] Ashton, K., "That 'Internet of Things' Thing", RFID
22, no. 7, pp. 97-114, 2009, Journal, vol. 22, no. 7, pp. 97-114, June 2009,
<http://www.itrco.jp/libraries/RFIDjournal- <http://www.itrco.jp/libraries/RFIDjournal-
That%20Internet%20of%20Things%20Thing.pdf>. That%20Internet%20of%20Things%20Thing.pdf>.
[Basudan] Basudan, S., Lin, X., and K. Sankaranarayanan, "A Privacy- [Basudan] Basudan, S., Lin, X., and K. Sankaranarayanan, "A Privacy-
Preserving Vehicular Crowdsensing-Based Road Surface Preserving Vehicular Crowdsensing-Based Road Surface
Condition Monitoring System Using Fog Computing", IEEE Condition Monitoring System Using Fog Computing", IEEE
Internet of Things Journal vol. 4, no. 3, pp. 772-782, Internet of Things Journal, vol. 4, no. 3, pp. 772-782,
DOI 10.1109/jiot.2017.2666783, June 2017, DOI 10.1109/jiot.2017.2666783, June 2017,
<https://doi.org/10.1109/jiot.2017.2666783>. <https://doi.org/10.1109/jiot.2017.2666783>.
[Botta] Botta, A., de Donato, W., Persico, V., and A. Pescape, [Botta] Botta, A., de Donato, W., Persico, V., and A. Pescapé,
"Integration of Cloud computing and Internet of Things: A "Integration of Cloud computing and Internet of Things: A
survey", Future Generation Computer Systems vol. 56, pp. survey", Future Generation Computer Systems, vol. 56, pp.
684-700, DOI 10.1016/j.future.2015.09.021, March 2016, 684-700, DOI 10.1016/j.future.2015.09.021, March 2016,
<https://doi.org/10.1016/j.future.2015.09.021>. <https://doi.org/10.1016/j.future.2015.09.021>.
[Brecko] Brecko, A., Kajati, E., Koziorek, J., and I. Zolotova, [Brecko] Brecko, A., Kajáti, E., Koziorek, J., and I. Zolotová,
"Federated Learning for Edge Computing: A Survey", Applied "Federated Learning for Edge Computing: A Survey", Applied
Sciences 12, no. 18 9124, DOI 10.3390/app12189124, 2022, Sciences 12(18):9124, DOI 10.3390/app12189124, September
<https://doi.org/10.3390/app12189124>. 2022, <https://doi.org/10.3390/app12189124>.
[Cao] Cao, L., Merican, A., Tootaghaj, D., Ahmed, F., Sharma, [Cao] Cao, L., Merican, A., Tootaghaj, D., Ahmed, F., Sharma,
P., and V. Saxena, "eCaaS: A Management Framework of Edge P., and V. Saxena, "eCaaS: A Management Framework of Edge
Container as a Service for Business Workload", Proceedings Container as a Service for Business Workload", Proceedings
of the 4th International Workshop on Edge Systems, of the 4th International Workshop on Edge Systems,
Analytics and Networking, DOI 10.1145/3434770.3459741, Analytics and Networking, DOI 10.1145/3434770.3459741,
April 2021, <https://doi.org/10.1145/3434770.3459741>. April 2021, <https://doi.org/10.1145/3434770.3459741>.
[Chen] Chen, B., Wan, J., Celesti, A., Li, D., Abbas, H., and Q. [Chen] Chen, B., Wan, J., Celesti, A., Li, D., Abbas, H., and Q.
Zhang, "Edge Computing in IoT-Based Manufacturing", IEEE Zhang, "Edge Computing in IoT-Based Manufacturing", IEEE
Communications Magazine vol. 56, no. 9, pp. 103-109, Communications Magazine, vol. 56, no. 9, pp. 103-109,
DOI 10.1109/mcom.2018.1701231, September 2018, DOI 10.1109/mcom.2018.1701231, September 2018,
<https://doi.org/10.1109/mcom.2018.1701231>. <https://doi.org/10.1109/mcom.2018.1701231>.
[Chiang] Chiang, M. and T. Zhang, "Fog and IoT: An Overview of [Chiang] Chiang, M. and T. Zhang, "Fog and IoT: An Overview of
Research Opportunities", IEEE Internet of Things Research Opportunities", IEEE Internet of Things Journal,
Journal vol. 3, no. 6, pp. 854-864, vol. 3, no. 6, pp. 854-864, DOI 10.1109/jiot.2016.2584538,
DOI 10.1109/jiot.2016.2584538, December 2016, December 2016,
<https://doi.org/10.1109/jiot.2016.2584538>. <https://doi.org/10.1109/jiot.2016.2584538>.
[chipmunk] Shin, Y., Park, S., Ko, N., and A. Jeong, "Chipmunk: [Chipmunk] Shin, Y., Park, S., Ko, N., and A. Jeong, "Chipmunk:
Distributed Object Storage for NDN", ACM, Proceedings of Distributed Object Storage for NDN", Proceedings of the
the 7th ACM Conference on Information-Centric Networking, 7th ACM Conference on Information-Centric Networking, ACM,
DOI 10.1145/3405656.3420231, September 2020, DOI 10.1145/3405656.3420231, September 2020,
<https://doi.org/10.1145/3405656.3420231>. <https://doi.org/10.1145/3405656.3420231>.
[Cloudlets] [Cloudlets]
Satyanarayanan, M., Bahl, P., Caceres, R., and N. Davies, Satyanarayanan, M., Bahl, P., Caceres, R., and N. Davies,
"The Case for VM-Based Cloudlets in Mobile Computing", "The Case for VM-Based Cloudlets in Mobile Computing",
IEEE Pervasive Computing vol. 8, no. 4, pp. 14-23, IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23,
DOI 10.1109/mprv.2009.82, October 2009, DOI 10.1109/mprv.2009.82, October 2009,
<https://doi.org/10.1109/mprv.2009.82>. <https://doi.org/10.1109/mprv.2009.82>.
[COIN-APPCENTRES]
Trossen, D., Sarathchandra, C., and M. Boniface, "In-
Network Computing for App-Centric Micro-Services", Work in
Progress, Internet-Draft, draft-sarathchandra-coin-
appcentres-04, 26 January 2021,
<https://datatracker.ietf.org/doc/html/draft-
sarathchandra-coin-appcentres-04>.
[CORE-GROUPCOMM-BIS]
Dijk, E., Wang, C., and M. Tiloca, "Group Communication
for the Constrained Application Protocol (CoAP)", Work in
Progress, Internet-Draft, draft-ietf-core-groupcomm-bis-
10, 23 October 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-core-
groupcomm-bis-10>.
[Echeverria] [Echeverria]
Echeverria, S., Klinedinst, D., Williams, K., and G. Echeverría, S., Klinedinst, D., Williams, K., and G.
Lewis, "Establishing Trusted Identities in Disconnected Lewis, "Establishing Trusted Identities in Disconnected
Edge Environments", 2016 IEEE/ACM Symposium on Edge Edge Environments", 2016 IEEE/ACM Symposium on Edge
Computing (SEC), DOI 10.1109/sec.2016.27, October 2016, Computing (SEC), DOI 10.1109/sec.2016.27, October 2016,
<https://doi.org/10.1109/sec.2016.27>. <https://doi.org/10.1109/sec.2016.27>.
[EDGE-COMPUTING-BACKGROUND]
de Foy, X., Hong, J., Hong, Y., Kovatsch, M., Schooler,
E., and D. Kutscher, "IoT Edge Computing: Initiatives,
Projects and Products", Work in Progress, Internet-Draft,
draft-defoy-t2trg-iot-edge-computing-background-00, 25 May
2020, <https://datatracker.ietf.org/doc/html/draft-defoy-
t2trg-iot-edge-computing-background-00>.
[EDGE-DATA-DISCOVERY-OVERVIEW]
McBride, M., Kutscher, D., Schooler, E., Bernardos, C. J.,
Lopez, D., and X. de Foy, "Edge Data Discovery for COIN",
Work in Progress, Internet-Draft, draft-mcbride-edge-data-
discovery-overview-05, 1 November 2020,
<https://datatracker.ietf.org/doc/html/draft-mcbride-edge-
data-discovery-overview-05>.
[ENERGY] Beckel, C., Sadamori, L., Staake, T., and S. Santini, [ENERGY] Beckel, C., Sadamori, L., Staake, T., and S. Santini,
"Revealing household characteristics from smart meter "Revealing household characteristics from smart meter
data", Energy vol. 78, pp. 397-410, data", Energy, vol. 78, pp. 397-410,
DOI 10.1016/j.energy.2014.10.025, December 2014, DOI 10.1016/j.energy.2014.10.025, December 2014,
<https://doi.org/10.1016/j.energy.2014.10.025>. <https://doi.org/10.1016/j.energy.2014.10.025>.
[ETSI_MEC_01] [ETSI_MEC_01]
ETSI, "Multi-access Edge Computing (MEC); Terminology", ETSI, "Multi-access Edge Computing (MEC); Terminology",
ETSI GS MEC 001, 2019, V2.1.1, ETSI GS MEC 001, January 2019,
<https://www.etsi.org/deliver/etsi_gs/ <https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf>. MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf>.
[ETSI_MEC_03] [ETSI_MEC_03]
ETSI, "Mobile Edge Computing (MEC); Framework and ETSI, "Multi-access Edge Computing (MEC); Framework and
Reference Architecture", ETSI GS MEC 003, 2019, Reference Architecture", V2.1.1, ETSI GS MEC 003, January
<https://www.etsi.org/deliver/etsi_gs/ 2019, <https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf>. MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf>.
[ETSI_MEC_33] [ETSI_MEC_33]
ETSI, "Multi-access Edge Computing (MEC); IoT API", ETSI ETSI, "Multi-access Edge Computing (MEC); IoT API",
GS MEC 033, 2022, <https://www.etsi.org/deliver/etsi_gs/ V3.1.1, ETSI GS MEC 033, December 2022,
<https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf>. MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf>.
[ETSI_Sandbox] [ETSI_Sandbox]
"Multi-access Edge Computing (MEC) MEC Sandbox Work Item", ETSI, "Multi-access Edge Computing (MEC) MEC Sandbox",
Portal, 2020, <https://portal.etsi.org/webapp/WorkProgram/ Portal, September 2023,
<https://portal.etsi.org/webapp/WorkProgram/
Report_WorkItem.asp?WKI_ID=57671>. Report_WorkItem.asp?WKI_ID=57671>.
[Fan] Fan, Q. and N. Ansari, "Cost Aware cloudlet Placement for [Fan] Fan, Q. and N. Ansari, "Cost Aware cloudlet Placement for
big data processing at the edge", 2017 IEEE International big data processing at the edge", 2017 IEEE International
Conference on Communications (ICC), Conference on Communications (ICC),
DOI 10.1109/icc.2017.7996722, May 2017, DOI 10.1109/icc.2017.7996722, May 2017,
<https://doi.org/10.1109/icc.2017.7996722>. <https://doi.org/10.1109/icc.2017.7996722>.
[Farnbauer-Schmidt] [Farnbauer-Schmidt]
Farnbauer-Schmidt, M., Lindner, J., Kaffenberger, C., and Farnbauer-Schmidt, M., Lindner, J., Kaffenberger, C., and
J. Albrecht, "Combining the Concepts of Semantic Data J. Albrecht, "Combining the Concepts of Semantic Data
Integration and Edge Computing", INFORMATIK 2019 50 Jahre Integration and Edge Computing", INFORMATIK 2019: 50 Jahre
Gesellschaft fur Informatik - Informatik fur Gesellschaft, Gesellschaft für Informatik Informatik für Gesellschaf,
pp. 139-152, DOI 10.18420/inf2019_19, 2019, pp. 139-152, DOI 10.18420/inf2019_19, September 2019,
<https://doi.org/10.18420/inf2019_19>. <https://doi.org/10.18420/inf2019_19>.
[Grewe] Grewe, D., Wagner, M., Arumaithurai, M., Psaras, I., and [Grewe] Grewe, D., Wagner, M., Arumaithurai, M., Psaras, I., and
D. Kutscher, "Information-Centric Mobile Edge Computing D. Kutscher, "Information-Centric Mobile Edge Computing
for Connected Vehicle Environments: Challenges and for Connected Vehicle Environments: Challenges and
Research Directions", Proceedings of the Workshop on Research Directions", Proceedings of the Workshop on
Mobile Edge Communications pp. 7-12, Mobile Edge Communications, pp. 7-12,
DOI 10.1145/3098208.3098210, 2017, DOI 10.1145/3098208.3098210, August 2017,
<https://doi.org/10.1145/3098208.3098210>. <https://doi.org/10.1145/3098208.3098210>.
[Harchol] Harchol, Y., Mushtaq, A., McCauley, J., Panda, A., and S. [Harchol] Harchol, Y., Mushtaq, A., McCauley, J., Panda, A., and S.
Shenker, "CESSNA: Resilient Edge-Computing", Proceedings Shenker, "CESSNA: Resilient Edge-Computing", Proceedings
of the 2018 Workshop on Mobile Edge Communications, of the 2018 Workshop on Mobile Edge Communications,
DOI 10.1145/3229556.3229558, August 2018, DOI 10.1145/3229556.3229558, August 2018,
<https://doi.org/10.1145/3229556.3229558>. <https://doi.org/10.1145/3229556.3229558>.
[I-D.bernardos-sfc-fog-ran] [IEC_IEEE_60802]
Bernardos, C. J. and A. Mourad, "Service Function Chaining IEC/IEEE, "Use Cases IEC/IEEE 60802", V1.3, IEC/
Use Cases in Fog RAN", Work in Progress, Internet-Draft, IEEE 60802, September 2018,
draft-bernardos-sfc-fog-ran-10, 22 October 2021, <https://grouper.ieee.org/groups/802/1/files/public/
<https://datatracker.ietf.org/doc/html/draft-bernardos- docs2018/60802-industrial-use-cases-0918-v13.pdf>.
sfc-fog-ran-10>.
[I-D.defoy-t2trg-iot-edge-computing-background]
de Foy, X., Hong, J., Hong, Y., Kovatsch, M., Schooler,
E., and D. Kutscher, "IoT Edge Computing: Initiatives,
Projects and Products", Work in Progress, Internet-Draft,
draft-defoy-t2trg-iot-edge-computing-background-00, 25 May
2020, <https://datatracker.ietf.org/doc/html/draft-defoy-
t2trg-iot-edge-computing-background-00>.
[I-D.hsingh-coinrg-reqs-p4comp]
Singh, H. and M. Montpetit, "Requirements for P4 Program
Splitting for Heterogeneous Network Nodes", Work in
Progress, Internet-Draft, draft-hsingh-coinrg-reqs-p4comp-
03, 18 February 2021,
<https://datatracker.ietf.org/doc/html/draft-hsingh-
coinrg-reqs-p4comp-03>.
[I-D.ietf-core-groupcomm-bis]
Dijk, E., Wang, C., and M. Tiloca, "Group Communication
for the Constrained Application Protocol (CoAP)", Work in
Progress, Internet-Draft, draft-ietf-core-groupcomm-bis-
09, 10 July 2023, <https://datatracker.ietf.org/doc/html/
draft-ietf-core-groupcomm-bis-09>.
[I-D.irtf-nmrg-network-digital-twin-arch]
Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu,
Q., Boucadair, M., and C. Jacquenet, "Digital Twin
Network: Concepts and Reference Architecture", Work in
Progress, Internet-Draft, draft-irtf-nmrg-network-digital-
twin-arch-03, 27 April 2023,
<https://datatracker.ietf.org/doc/html/draft-irtf-nmrg-
network-digital-twin-arch-03>.
[I-D.irtf-t2trg-rest-iot]
Keränen, A., Kovatsch, M., and K. Hartke, "Guidance on
RESTful Design for Internet of Things Systems", Work in
Progress, Internet-Draft, draft-irtf-t2trg-rest-iot-12, 25
July 2023, <https://datatracker.ietf.org/doc/html/draft-
irtf-t2trg-rest-iot-12>.
[I-D.mcbride-edge-data-discovery-overview]
McBride, M., Kutscher, D., Schooler, E., Bernardos, C. J.,
Lopez, D., and X. de Foy, "Edge Data Discovery for COIN",
Work in Progress, Internet-Draft, draft-mcbride-edge-data-
discovery-overview-05, 1 November 2020,
<https://datatracker.ietf.org/doc/html/draft-mcbride-edge-
data-discovery-overview-05>.
[I-D.sarathchandra-coin-appcentres]
Trossen, D., Sarathchandra, C., and M. Boniface, "In-
Network Computing for App-Centric Micro-Services", Work in
Progress, Internet-Draft, draft-sarathchandra-coin-
appcentres-04, 26 January 2021,
<https://datatracker.ietf.org/doc/html/draft-
sarathchandra-coin-appcentres-04>.
[ISO_TR] "Internet of things (IoT) - Edge computing", ISO/IEC TR [ISO_TR] "Internet of things (IoT) - Edge computing", ISO/IEC TR
30164, 2020, <https://www.iso.org/standard/53284.html>. 30164:2020, April 2020,
<https://www.iso.org/standard/53284.html>.
[Jeffery] Jeffery, A., Howard, H., and R. Mortier, "Rearchitecting [Jeffery] Jeffery, A., Howard, H., and R. Mortier, "Rearchitecting
Kubernetes for the Edge", Proceedings of the 4th Kubernetes for the Edge", Proceedings of the 4th
International Workshop on Edge Systems, Analytics International Workshop on Edge Systems, Analytics and
and Networking, DOI 10.1145/3434770.3459730, April 2021, Networking, DOI 10.1145/3434770.3459730, April 2021,
<https://doi.org/10.1145/3434770.3459730>. <https://doi.org/10.1145/3434770.3459730>.
[Jeong] Jeong, T., Chung, J., Hong, J., and S. Ha, "Towards a [Jeong] Jeong, T., Chung, J., Hong, J., and S. Ha, "Towards a
distributed computing framework for Fog", 2017 IEEE Fog distributed computing framework for Fog", 2017 IEEE Fog
World Congress (FWC), DOI 10.1109/fwc.2017.8368528, World Congress (FWC), DOI 10.1109/fwc.2017.8368528,
October 2017, <https://doi.org/10.1109/fwc.2017.8368528>. October 2017, <https://doi.org/10.1109/fwc.2017.8368528>.
[Jones] Jones, D., Snider, C., Nassehi, A., Yon, J., and B. Hicks, [Jones] Jones, D., Snider, C., Nassehi, A., Yon, J., and B. Hicks,
"Characterising the Digital Twin: A systematic literature "Characterising the Digital Twin: A systematic literature
review", CIRP Journal of Manufacturing Science and review", CIRP Journal of Manufacturing Science and
Technology vol. 29, pp. 36-52, Technology, vol. 29, pp. 36-52,
DOI 10.1016/j.cirpj.2020.02.002, May 2020, DOI 10.1016/j.cirpj.2020.02.002, May 2020,
<https://doi.org/10.1016/j.cirpj.2020.02.002>. <https://doi.org/10.1016/j.cirpj.2020.02.002>.
[Kelly] Kelly, R., "Internet of Things Data to Top 1.6 Zettabytes [Kelly] Kelly, R., "Internet of Things Data to Top 1.6 Zettabytes
by 2022", Retrieved on 2022-05-24, 2015, by 2020", April 2015,
<https://campustechnology.com/articles/2015/04/15/ <https://campustechnology.com/articles/2015/04/15/
internet-of-things-data-to-top-1-6-zettabytes-by- internet-of-things-data-to-top-1-6-zettabytes-by-
2020.aspx>. 2020.aspx>. Retrieved on 2022-05-24.
[Khan] Khan, L., Yaqoob, I., Tran, N., Kazmi, S., Dang, T., and [Khan] Khan, L., Yaqoob, I., Tran, N., Kazmi, S., Dang, T., and
C. Hong, "Edge-Computing-Enabled Smart Cities: A C. Hong, "Edge-Computing-Enabled Smart Cities: A
Comprehensive Survey", IEEE Internet of Things Comprehensive Survey", IEEE Internet of Things Journal,
Journal vol. 7, no. 10, pp. 10200-10232, vol. 7, no. 10, pp. 10200-10232,
DOI 10.1109/jiot.2020.2987070, October 2020, DOI 10.1109/jiot.2020.2987070, October 2020,
<https://doi.org/10.1109/jiot.2020.2987070>. <https://doi.org/10.1109/jiot.2020.2987070>.
[kua] Patil, V., Desai, H., and L. Zhang, "Kua: a distributed [Kua] Patil, V., Desai, H., and L. Zhang, "Kua: a distributed
object store over named data networking", ACM, Proceedings object store over named data networking", Proceedings of
of the 9th ACM Conference on Information- the 9th ACM Conference on Information-Centric Networking,
Centric Networking, DOI 10.1145/3517212.3558083, September DOI 10.1145/3517212.3558083, September 2022,
2022, <https://doi.org/10.1145/3517212.3558083>. <https://doi.org/10.1145/3517212.3558083>.
[Larrea] Larrea, J. and A. Barbalace, "The serverkernel operating [Larrea] Larrea, J. and A. Barbalace, "The serverkernel operating
system", Proceedings of the Third ACM International system", Proceedings of the Third ACM International
Workshop on Edge Systems, Analytics and Networking, Workshop on Edge Systems, Analytics and Networking,
DOI 10.1145/3378679.3394537, April 2020, DOI 10.1145/3378679.3394537, May 2020,
<https://doi.org/10.1145/3378679.3394537>. <https://doi.org/10.1145/3378679.3394537>.
[LFEDGE-EVE] [LFEDGE-EVE]
Linux Foundation, "Project Edge Virtualization Engine Linux Foundation, "Project Edge Virtualization Engine
(EVE)", Portal, retrieved on 2022-05-24, 2020, (EVE)", Portal, <https://www.lfedge.org/projects/eve>.
<https://www.lfedge.org/projects/eve>. Retrieved on 2022-05-24.
[Li] Li, Y., Chen, Y., Lan, T., and G. Venkataramani, "MobiQoR: [Li] Li, Y., Chen, Y., Lan, T., and G. Venkataramani, "MobiQoR:
Pushing the Envelope of Mobile Edge Computing Via Quality- Pushing the Envelope of Mobile Edge Computing Via Quality-
of-Result Optimization", 2017 IEEE 37th International of-Result Optimization", 2017 IEEE 37th International
Conference on Distributed Computing Systems (ICDCS), Conference on Distributed Computing Systems (ICDCS),
DOI 10.1109/icdcs.2017.54, June 2017, DOI 10.1109/icdcs.2017.54, June 2017,
<https://doi.org/10.1109/icdcs.2017.54>. <https://doi.org/10.1109/icdcs.2017.54>.
[Lin] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and W. [Lin] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and W.
Zhao, "A Survey on Internet of Things: Architecture, Zhao, "A Survey on Internet of Things: Architecture,
Enabling Technologies, Security and Privacy, and Enabling Technologies, Security and Privacy, and
Applications", IEEE Internet of Things Journal vol. 4, no. Applications", IEEE Internet of Things Journal, vol. 4,
5, pp. 1125-1142, DOI 10.1109/jiot.2017.2683200, October no. 5, pp. 1125-1142, DOI 10.1109/jiot.2017.2683200,
2017, <https://doi.org/10.1109/jiot.2017.2683200>. October 2017, <https://doi.org/10.1109/jiot.2017.2683200>.
[Liu] Liu, J., Bai, B., Zhang, J., and K. Letaief, "Cache [Liu] Liu, J., Bai, B., Zhang, J., and K. Letaief, "Cache
Placement in Fog-RANs: From Centralized to Distributed Placement in Fog-RANs: From Centralized to Distributed
Algorithms", IEEE Transactions on Wireless Algorithms", IEEE Transactions on Wireless Communications,
Communications vol. 16, no. 11, pp. 7039-7051, vol. 16, no. 11, pp. 7039-7051,
DOI 10.1109/twc.2017.2737015, November 2017, DOI 10.1109/twc.2017.2737015, November 2017,
<https://doi.org/10.1109/twc.2017.2737015>. <https://doi.org/10.1109/twc.2017.2737015>.
[Madni] Madni, A. M., Madni, C., and S. D. Lucero, "Leveraging [Madni] Madni, A., Madni, C., and S. Lucero, "Leveraging Digital
digital twin technology in model-based systems Twin Technology in Model-Based Systems Engineering",
engineering", Systems 7, no. 1 7, Systems 7(1):7, DOI 10.3390/systems7010007, January 2019,
DOI 10.3390/systems7010007, 2019,
<https://doi.org/10.3390/systems7010007>. <https://doi.org/10.3390/systems7010007>.
[Mahadev] Satyanarayanan, M., "The Emergence of Edge Computing", [Mahadev] Satyanarayanan, M., "The Emergence of Edge Computing",
Computer vol. 50, no. 1, pp. 30-39, DOI 10.1109/mc.2017.9, Computer, vol. 50, no. 1, pp. 30-39,
January 2017, <https://doi.org/10.1109/mc.2017.9>. DOI 10.1109/mc.2017.9, January 2017,
<https://doi.org/10.1109/mc.2017.9>.
[Mortazavi] [Mortazavi]
Hossein Mortazavi, S., Balasubramanian, B., de Lara, E., Mortazavi, S., Balasubramanian, B., de Lara, E., and S.
and S. P. Narayanan, "Toward Session Consistency for the Narayanan, "Toward Session Consistency for the Edge",
Edge", USENIX, Workshop on Hot Topics in Edge Computing USENIX Workshop on Hot Topics in Edge Computing (HotEdge
(HotEdge 18), 2018, 18), 2018,
<https://www.usenix.org/conference/hotedge18/presentation/ <https://www.usenix.org/conference/hotedge18/presentation/
mortazavi>. mortazavi>.
[mqtt5] OASIS Message Queuing Telemetry Transport (MQTT) TC, "MQTT [MQTT5] Banks, A., Ed., Briggs, E., Ed., Borgendale, K., Ed., and
Version 5.0", OASIS, March 2019, <https://docs.oasis- R. Gupta, Ed., "MQTT Version 5.0", OASIS Standard, March
open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html>. 2019, <https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-
v5.0.html>.
[Murshed] Murshed, M., Murphy, C., Hou, D., Khan, N., [Murshed] Murshed, M., Murphy, C., Hou, D., Khan, N.,
Ananthanarayanan, G., and F. Hussain, "Machine Learning at Ananthanarayanan, G., and F. Hussain, "Machine Learning at
the Network Edge: A Survey", ACM Computing Surveys vol. the Network Edge: A Survey", ACM Computing Surveys, vol.
54, no. 8, pp. 1-37, DOI 10.1145/3469029, November 2022, 54, no. 8, pp. 1-37, DOI 10.1145/3469029, October 2021,
<https://doi.org/10.1145/3469029>. <https://doi.org/10.1145/3469029>.
[NETWORK-DIGITAL-TWIN-ARCH]
Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu,
Q., Boucadair, M., and C. Jacquenet, "Network Digital
Twin: Concepts and Reference Architecture", Work in
Progress, Internet-Draft, draft-irtf-nmrg-network-digital-
twin-arch-05, 4 March 2024,
<https://datatracker.ietf.org/doc/html/draft-irtf-nmrg-
network-digital-twin-arch-05>.
[Nieke] Nieke, M., Almstedt, L., and R. Kapitza, "Edgedancer: [Nieke] Nieke, M., Almstedt, L., and R. Kapitza, "Edgedancer:
Secure Mobile WebAssembly Services on the Edge", Secure Mobile WebAssembly Services on the Edge",
Proceedings of the 4th International Workshop on Edge Proceedings of the 4th International Workshop on Edge
Systems, Analytics and Networking, Systems, Analytics and Networking,
DOI 10.1145/3434770.3459731, April 2021, DOI 10.1145/3434770.3459731, April 2021,
<https://doi.org/10.1145/3434770.3459731>. <https://doi.org/10.1145/3434770.3459731>.
[NIST] Mell, P. and T. Grance, "The NIST definition of cloud [NIST] Mell, P. and T. Grance, "The NIST Definition of Cloud
computing", National Institute of Standards and Computing", NIST Special Publication 800-145,
Technology report, DOI 10.6028/nist.sp.800-145, 2011, DOI 10.6028/nist.sp.800-145, September 2011,
<https://doi.org/10.6028/nist.sp.800-145>. <https://doi.org/10.6028/nist.sp.800-145>.
[NVIDIA] Grzywaczewski, A., "Training AI for Self-Driving Vehicles: [NVIDIA] Grzywaczewski, A., "Training AI for Self-Driving Vehicles:
the Challenge of Scale", NVIDIA Developer Blog, retrieved the Challenge of Scale", NVIDIA Developer Blog, October
on 2022-05-24, 2017, <https://devblogs.nvidia.com/ 2017, <https://devblogs.nvidia.com/training-self-driving-
training-self-driving-vehicles-challenge-scale/>. vehicles-challenge-scale/>. Retrieved on 2022-05-24.
[oneM2M-TR0001] [oneM2M-TR0001]
Mladin, C., "TR 0001, Use Cases Collection", oneM2M, Mladin, C., "Use Cases Collection", oneM2M, v4.2.0,
October 2018, TR 0001, October 2018,
<https://member.onem2m.org/Application/documentapp/ <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=28153>. downloadLatestRevision/default.aspx?docID=28153>.
[oneM2M-TR0018] [oneM2M-TR0018]
Lu, C. and M. Jiang, "TR 0018, Industrial Domain Lu, C. and M. Jiang, "Industrial Domain Enablement",
Enablement", oneM2M, February 2019, oneM2M, v2.5.2, TR 0018, February 2019,
<https://member.onem2m.org/Application/documentapp/ <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=29334>. downloadLatestRevision/default.aspx?docID=29334>.
[oneM2M-TR0026] [oneM2M-TR0026]
Yamamoto, K., Mladin, C., and V. Kueh, "TR 0026, Vehicular Yamamoto, K., Mladin, C., and V. Kueh, "Vehicular Domain
Domain Enablement", oneM2M, January 2020, Enablement", oneM2M, TR 0026, January 2020,
<https://member.onem2m.org/Application/documentapp/ <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=31410>. downloadLatestRevision/default.aspx?docID=31410>.
[oneM2M-TR0052] [oneM2M-TR0052]
Yamamoto, K. and C. Mladin, "TR 0052, Study on Edge and Yamamoto, K. and C. Mladin, "Study on Edge and Fog
Fog Computing in oneM2M systems", oneM2M, September 2020, Computing in oneM2M systems", oneM2M, TR 0052, September
<https://member.onem2m.org/Application/documentapp/ 2020, <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=32633>. downloadLatestRevision/default.aspx?docID=32633>.
[oneM2M-TS0002] [oneM2M-TS0002]
He, S., "TS 0002, Requirements", oneM2M, February 2019, He, S., "TS 0002, Requirements", oneM2M, TS 0002, February
<https://member.onem2m.org/Application/documentapp/ 2019, <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=29274>. downloadLatestRevision/default.aspx?docID=29274>.
[OpenFog] "OpenFog Reference Architecture for Fog Computing", [OpenFog] OpenFog Consortium, "OpenFog Reference Architecture for
OpenFog Consortium, 2017, <https://iiconsortium.org/pdf/ Fog Computing", February 2017,
<https://iiconsortium.org/pdf/
OpenFog_Reference_Architecture_2_09_17.pdf>. OpenFog_Reference_Architecture_2_09_17.pdf>.
[PseudoDynamicTesting] [PseudoDynamicTesting]
Ficco, M., Esposito, C., Xiang, Y., and F. Palmieri, Ficco, M., Esposito, C., Xiang, Y., and F. Palmieri,
"Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud "Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud
Ecosystems", IEEE Communications Magazine vol. 55, no. 11, Ecosystems", IEEE Communications Magazine, vol. 55, no.
pp. 98-104, DOI 10.1109/mcom.2017.1700328, November 2017, 11, pp. 98-104, DOI 10.1109/mcom.2017.1700328, November
<https://doi.org/10.1109/mcom.2017.1700328>. 2017, <https://doi.org/10.1109/mcom.2017.1700328>.
[Renart] Renart, E., Diaz-Montes, J., and M. Parashar, "Data-Driven [Renart] Renart, E., Diaz-Montes, J., and M. Parashar, "Data-Driven
Stream Processing at the Edge", 2017 IEEE 1st Stream Processing at the Edge", 2017 IEEE 1st
International Conference on Fog and Edge International Conference on Fog and Edge Computing
Computing (ICFEC), DOI 10.1109/icfec.2017.18, May 2017, (ICFEC), DOI 10.1109/icfec.2017.18, May 2017,
<https://doi.org/10.1109/icfec.2017.18>. <https://doi.org/10.1109/icfec.2017.18>.
[REQS-P4COMP]
Singh, H. and M. Montpetit, "Requirements for P4 Program
Splitting for Heterogeneous Network Nodes", Work in
Progress, Internet-Draft, draft-hsingh-coinrg-reqs-p4comp-
03, 18 February 2021,
<https://datatracker.ietf.org/doc/html/draft-hsingh-
coinrg-reqs-p4comp-03>.
[REST-IOT] Keränen, A., Kovatsch, M., and K. Hartke, "Guidance on
RESTful Design for Internet of Things Systems", Work in
Progress, Internet-Draft, draft-irtf-t2trg-rest-iot-13, 25
January 2024, <https://datatracker.ietf.org/doc/html/
draft-irtf-t2trg-rest-iot-13>.
[RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu, [RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu,
D., and S. Mansfield, "Guidelines for the Use of the "OAM" D., and S. Mansfield, "Guidelines for the Use of the "OAM"
Acronym in the IETF", BCP 161, RFC 6291, Acronym in the IETF", BCP 161, RFC 6291,
DOI 10.17487/RFC6291, June 2011, DOI 10.17487/RFC6291, June 2011,
<https://www.rfc-editor.org/rfc/rfc6291>. <https://www.rfc-editor.org/info/rfc6291>.
[RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
Application Protocol (CoAP)", RFC 7252, Application Protocol (CoAP)", RFC 7252,
DOI 10.17487/RFC7252, June 2014, DOI 10.17487/RFC7252, June 2014,
<https://www.rfc-editor.org/rfc/rfc7252>. <https://www.rfc-editor.org/info/rfc7252>.
[RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for [RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for
the Constrained Application Protocol (CoAP)", RFC 7390, the Constrained Application Protocol (CoAP)", RFC 7390,
DOI 10.17487/RFC7390, October 2014, DOI 10.17487/RFC7390, October 2014,
<https://www.rfc-editor.org/rfc/rfc7390>. <https://www.rfc-editor.org/info/rfc7390>.
[RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases",
RFC 8578, DOI 10.17487/RFC8578, May 2019, RFC 8578, DOI 10.17487/RFC8578, May 2019,
<https://www.rfc-editor.org/rfc/rfc8578>. <https://www.rfc-editor.org/info/rfc8578>.
[Schafer] Schafer, D., Edinger, J., VanSyckel, S., Paluska, J., and [Schafer] Schäfer, D., Edinger, J., VanSyckel, S., Paluska, J., and
C. Becker, "Tasklets: Overcoming Heterogeneity in C. Becker, "Tasklets: Overcoming Heterogeneity in
Distributed Computing Systems", 2016 IEEE 36th Distributed Computing Systems", 2016 IEEE 36th
International Conference on Distributed Computing Systems International Conference on Distributed Computing Systems
Workshops (ICDCSW), DOI 10.1109/icdcsw.2016.22, June 2016, Workshops (ICDCSW), DOI 10.1109/icdcsw.2016.22, June 2016,
<https://doi.org/10.1109/icdcsw.2016.22>. <https://doi.org/10.1109/icdcsw.2016.22>.
[Senel] Senel, B., Mouchet, M., Cappos, J., Fourmaux, O., [Senel] Şenel, B., Mouchet, M., Cappos, J., Fourmaux, O.,
Friedman, T., and R. McGeer, "EdgeNet: A Multi-Tenant and Friedman, T., and R. McGeer, "EdgeNet: A Multi-Tenant and
Multi-Provider Edge Cloud", Proceedings of the 4th Multi-Provider Edge Cloud", Proceedings of the 4th
International Workshop on Edge Systems, Analytics International Workshop on Edge Systems, Analytics and
and Networking, DOI 10.1145/3434770.3459737, April 2021, Networking, DOI 10.1145/3434770.3459737, April 2021,
<https://doi.org/10.1145/3434770.3459737>. <https://doi.org/10.1145/3434770.3459737>.
[SFC-FOG-RAN]
Bernardos, C. J. and A. Mourad, "Service Function Chaining
Use Cases in Fog RAN", Work in Progress, Internet-Draft,
draft-bernardos-sfc-fog-ran-10, 22 October 2021,
<https://datatracker.ietf.org/doc/html/draft-bernardos-
sfc-fog-ran-10>.
[Shi] Shi, W., Cao, J., Zhang, Q., Li, Y., and L. Xu, "Edge [Shi] Shi, W., Cao, J., Zhang, Q., Li, Y., and L. Xu, "Edge
Computing: Vision and Challenges", IEEE Internet of Things Computing: Vision and Challenges", IEEE Internet of Things
Journal vol. 3, no. 5, pp. 637-646, Journal, vol. 3, no. 5, pp. 637-646,
DOI 10.1109/jiot.2016.2579198, October 2016, DOI 10.1109/jiot.2016.2579198, October 2016,
<https://doi.org/10.1109/jiot.2016.2579198>. <https://doi.org/10.1109/jiot.2016.2579198>.
[SimulatingFog] [SimulatingFog]
Svorobej, S., Takako Endo, P., Bendechache, M., Filelis- Svorobej, S., Takako Endo, P., Bendechache, M., Filelis-
Papadopoulos, C., Giannoutakis, K., Gravvanis, G., Papadopoulos, C., Giannoutakis, K., Gravvanis, G.,
Tzovaras, D., Byrne, J., and T. Lynn, "Simulating Fog and Tzovaras, D., Byrne, J., and T. Lynn, "Simulating Fog and
Edge Computing Scenarios: An Overview and Research Edge Computing Scenarios: An Overview and Research
Challenges", Future Internet vol. 11, no. 3, pp. 55, Challenges", Future Internet, vol. 11, no. 3, pp. 55,
DOI 10.3390/fi11030055, February 2019, DOI 10.3390/fi11030055, February 2019,
<https://doi.org/10.3390/fi11030055>. <https://doi.org/10.3390/fi11030055>.
[Stanciu] Stanciu, V., Steen, M., Dobre, C., and A. Peter, "Privacy- [Stanciu] Stanciu, V., Steen, M., Dobre, C., and A. Peter, "Privacy-
Preserving Crowd-Monitoring Using Bloom Filters and Preserving Crowd-Monitoring Using Bloom Filters and
Homomorphic Encryption", Proceedings of the 4th Homomorphic Encryption", Proceedings of the 4th
International Workshop on Edge Systems, Analytics International Workshop on Edge Systems, Analytics and
and Networking, DOI 10.1145/3434770.3459735, April 2021, Networking, DOI 10.1145/3434770.3459735, April 2021,
<https://doi.org/10.1145/3434770.3459735>. <https://doi.org/10.1145/3434770.3459735>.
[Weiner] Weiner, M., Jorgovanovic, M., Sahai, A., and B. Nikolie, [Weiner] Weiner, M., Jorgovanovic, M., Sahai, A., and B. Nikolie,
"Design of a low-latency, high-reliability wireless "Design of a low-latency, high-reliability wireless
communication system for control applications", 2014 IEEE communication system for control applications", 2014 IEEE
International Conference on Communications (ICC), International Conference on Communications (ICC),
DOI 10.1109/icc.2014.6883918, June 2014, DOI 10.1109/icc.2014.6883918, June 2014,
<https://doi.org/10.1109/icc.2014.6883918>. <https://doi.org/10.1109/icc.2014.6883918>.
[Yangui] Yangui, S., Ravindran, P., Bibani, O., Glitho, R., Ben [Yangui] Yangui, S., Ravindran, P., Bibani, O., Glitho, R., Ben
Hadj-Alouane, N., Morrow, M., and P. Polakos, "A platform Hadj-Alouane, N., Morrow, M., and P. Polakos, "A platform
as-a-service for hybrid cloud/fog environments", 2016 IEEE as-a-service for hybrid cloud/fog environments", 2016 IEEE
International Symposium on Local and Metropolitan Area International Symposium on Local and Metropolitan Area
Networks (LANMAN), DOI 10.1109/lanman.2016.7548853, June Networks (LANMAN), DOI 10.1109/lanman.2016.7548853, June
2016, <https://doi.org/10.1109/lanman.2016.7548853>. 2016, <https://doi.org/10.1109/lanman.2016.7548853>.
[Yates] Yates, R. and S. Kaul, "The Age of Information: Real-Time [Yates] Yates, R. and S. Kaul, "The Age of Information: Real-Time
Status Updating by Multiple Sources", IEEE Transactions on Status Updating by Multiple Sources", IEEE Transactions on
Information Theory vol. 65, no. 3, pp. 1807-1827, Information Theory, vol. 65, no. 3, pp. 1807-1827,
DOI 10.1109/tit.2018.2871079, March 2019, DOI 10.1109/tit.2018.2871079, March 2019,
<https://doi.org/10.1109/tit.2018.2871079>. <https://doi.org/10.1109/tit.2018.2871079>.
[Yousefpour] [Yousefpour]
Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K.,
Jalali, F., Niakanlahiji, A., Kong, J., and J. Jue, "All Jalali, F., Niakanlahiji, A., Kong, J., and J. Jue, "All
one needs to know about fog computing and related edge one needs to know about fog computing and related edge
computing paradigms: A complete survey", Journal of computing paradigms: A complete survey", Journal of
Systems Architecture vol. 98, pp. 289-330, Systems Architecture, vol. 98, pp. 289-330,
DOI 10.1016/j.sysarc.2019.02.009, September 2019, DOI 10.1016/j.sysarc.2019.02.009, September 2019,
<https://doi.org/10.1016/j.sysarc.2019.02.009>. <https://doi.org/10.1016/j.sysarc.2019.02.009>.
[Zhang] Zhang, Q., Zhang, X., Zhang, Q., Shi, W., and H. Zhong, [Zhang] Zhang, Q., Zhang, X., Zhang, Q., Shi, W., and H. Zhong,
"Firework: Big Data Sharing and Processing in "Firework: Big Data Sharing and Processing in
Collaborative Edge Environment", 2016 Fourth IEEE Workshop Collaborative Edge Environment", 2016 Fourth IEEE Workshop
on Hot Topics in Web Systems and Technologies (HotWeb), on Hot Topics in Web Systems and Technologies (HotWeb),
DOI 10.1109/hotweb.2016.12, October 2016, DOI 10.1109/hotweb.2016.12, October 2016,
<https://doi.org/10.1109/hotweb.2016.12>. <https://doi.org/10.1109/hotweb.2016.12>.
[Zhang2] Zhang, J., Chen, B., Zhao, Y., Cheng, X., and F. Hu, "Data [Zhang2] Zhang, J., Chen, B., Zhao, Y., Cheng, X., and F. Hu, "Data
Security and Privacy-Preserving in Edge Computing Security and Privacy-Preserving in Edge Computing
Paradigm: Survey and Open Issues", IEEE Access vol. 6, pp. Paradigm: Survey and Open Issues", IEEE Access, vol. 6,
18209-18237, DOI 10.1109/access.2018.2820162, 2018, pp. 18209-18237, DOI 10.1109/access.2018.2820162, March
<https://doi.org/10.1109/access.2018.2820162>. 2018, <https://doi.org/10.1109/access.2018.2820162>.
[_60802] IEC/IEEE, "Use Cases IEC/IEEE 60802 V1.3", IEC/IEEE 60802, Acknowledgements
2018, <https://grouper.ieee.org/groups/802/1/files/public/
docs2018/60802-industrial-use-cases-0918-v13.pdf>. The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel
Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-
José Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed,
JaeSeung Song, Roberto Morabito, Carsten Bormann, and Ari Keränen for
their valuable comments and suggestions on this document.
Authors' Addresses Authors' Addresses
Jungha Hong Jungha Hong
ETRI ETRI
218 Gajeong-ro, Yuseung-Gu 218 Gajeong-ro, Yuseung-Gu
Daejeon Daejeon
34129 34129
Republic of Korea Republic of Korea
Email: jhong@etri.re.kr Email: jhong@etri.re.kr
skipping to change at page 37, line 4 skipping to change at line 1678
Montreal H3A 3G4 Montreal H3A 3G4
Canada Canada
Email: xavier.defoy@interdigital.com Email: xavier.defoy@interdigital.com
Matthias Kovatsch Matthias Kovatsch
Huawei Technologies Duesseldorf GmbH Huawei Technologies Duesseldorf GmbH
Riesstr. 25 C // 3.OG Riesstr. 25 C // 3.OG
80992 Munich 80992 Munich
Germany Germany
Email: ietf@kovatsch.net Email: ietf@kovatsch.net
Eve Schooler Eve Schooler
Intel University of Oxford
2200 Mission College Blvd. Parks Road
Santa Clara, CA, 95054-1537 Oxford
United States of America OX1 3PJ
United Kingdom
Email: eve.schooler@gmail.com Email: eve.schooler@gmail.com
Dirk Kutscher Dirk Kutscher
Hong Kong University of Science and Technology (Guangzhou) Hong Kong University of Science and Technology (Guangzhou)
No.1 Du Xue Rd No.1 Du Xue Rd
Guangzhou Guangzhou
China China
Email: ietf@dkutscher.net Email: ietf@dkutscher.net
 End of changes. 221 change blocks. 
731 lines changed or deleted 749 lines changed or added

This html diff was produced by rfcdiff 1.48.