SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
IEEE COMMUNICATIONS MAGAZINE 1
The role of edge computing in Internet of Things
Najmul Hassan, Saira Gillani, Member, IEEE, Ejaz Ahmed, Member, IEEE,
Ibrar Yaqoob, Member, IEEE, Muhammad Imran, Member, IEEE
Abstract—Remarkable advancements in embedded
systems-on-a-chip have significantly increased the number
of commercial devices that possess sufficient resources to
run full-fledged operating systems. This increment has
extended the potential of the Internet of Things (IoT).
Many early IoT devices could only collect and send
data for analysis. However, the increasing computing
capacity of today’s devices allow them to perform complex
computations on-site, resulting in edge computing. Edge
computing extends cloud computing capabilities by
bringing services close to the edge of a network and thus
supports a new variety of services and applications. In
this work, we investigate, highlight, and report recent
advances in edge computing technologies with respect to
measuring their impact on IoT. We establish a taxonomy
of edge computing by classifying and categorizing existing
literature, and by doing so, we reveal the salient and
supportive features of different edge computing paradigms
for IoT. Moreover, we present the key requirements for
the successful deployment of edge computing in IoT and
discuss a few indispensable scenarios of edge computing
in IoT. Several open research challenges are also outlined.
Index Terms—Internet of Things, Edge Computing, Fog
Computing, Mobile Edge Computing, Cloudlets
I. INTRODUCTION
Billions of smart devices can now connect to the
Internet in the form of the Internet of Things (IoT)
due to advancements in networking technologies
[1]. According to a Cisco report, these devices will
generate 507.9 ZB of data by 2019. Data generated
N. Hassan is with COMSATS University Islamabad, Attock Cam-
pus. (Email: sardarnajam83@gmail.com)
S. Gillani is with the College of Computing and Informat-
ics, Saudi Electronic University, Jeddah, Saudi Arabia. (Email:
saira.a.gillani@ieee.org)
E. Ahmed and I. Yaqoob are with the Centre for Mobile
Cloud Computing Research, University of Malaya, Malaysia. (Email:
ejazahmed@ieee.org, ibraryaqoob@ieee.org)
M. Imran is with the College of Computer and Informa-
tion Sciences, King Saud University, Saudi Arabia. (Email:
dr.m.imran@ieee.org)
Corresponding Authors: Ejaz Ahmed and Muhammad Imran
by IoT-devices are essential for organizations that
are interested in improving their productivity and
revenues. However, management and analysis of
such large amounts of data are cumbersome and
challenging for organizations that rely on conven-
tional computing paradigms. Edge computing is
gaining popularity in this context because IoT is
becoming common in processing data on the edge
of networks [2].
Given that data are rapidly produced at the edge
of networks, dealing with these data at the edge of
the network would be effective. Several approaches,
such as cloudlet [3], fog computing [4], and mobile
edge computing (MEC) [5], provide complementary
solutions to cloud computing to reduce data process-
ing on the network edge. In short, edge computing is
a general term that represents fog computing, MEC,
cloudlets, and micro clouds. Storage, computing,
and power are regarded as being on the edge of
networks to increase availability, reduce latency, and
eventually overcome cloud computing issues [6].
Edge computing facilitates the processing of delay-
sensitive and bandwidth-hungry applications near
the data source [7]. Figure 1 illustrates a layered
model for cloud edge-based IoT service delivery.
Although several studies have been conducted on
different edge computing paradigms (i.e., fog, edge,
and cloudlets) [8] [9] [3], no study has examined
all of the previously mentioned edge computing
paradigms in terms of IoT. Research in this direction
should be conducted because of the significance of
the emerging paradigm of edge computing and its
role in the success of IoT. This study highlights the
role of edge computing in the IoT context.
The contributions of this work are manifold.
• We investigate, highlight, and report recent
premier advances in edge computing from the
IoT perspective.
• We categorize and classify edge computing
literature by devising a taxonomy.
• We outline key requirements for the successful
deployment of edge computing in IoT.
IEEE COMMUNICATIONS MAGAZINE 2
Smart IoT
Devices
Edge Gateways
Cloud Data Centers
Layered Model for Cloud Edge-based IoT Service Delivery
Hundreds
Thousands
M
illions
Fig. 1: Layered Model for Cloud Edge-based IoT Services Delivery
• We present a few indispensable scenarios of
edge computing in IoT.
• We identify and elaborate several open research
challenges.
These contributions are discussed separately in
Sections II to V. The concluding remarks are pro-
vided in Section VI.
II. TAXONOMY OF IOT-BASED EDGE
COMPUTING
Figure 2 depicts a taxonomy of IoT-based edge
computing that considers particular features, such
as wireless network technologies, computing nodes,
computing paradigms, service level objectives, ma-
jor enablers, data types, applications, and attributes.
A. Network Technologies
IoT devices send collected data to a locally avail-
able edge server for processing. These devices com-
municate with edge computing platforms through ei-
ther wireless networking technologies, such as WiFi
and cellular networking (e.g., 3G, 4G, and 5G), or
wired technologies, such as Ethernet. These network
technologies vary in terms of data rate, transmission
range, and number of supported devices. Wireless
networks provide flexibility and mobility to users
who execute their applications on the edge server.
However, wireless network technologies are not as
reliable as wired technologies.
B. Computing Nodes
IoT devices have limited processing capabili-
ties, which make them unsuitable for computation-
intensive tasks. However, resource-constrained IoT
devices can augment their capabilities by leveraging
the resources of edge servers. The edge computing
paradigm relies on different computational devices
to provide services to IoT users. These computa-
tional devices are the core element of IoT-based
edge computing. Computing nodes include servers,
base stations (BS), routers, and vehicles that can
provide resources and various services to IoT de-
vices. The use of these devices is specific to the
computing paradigm.
C. Computing Paradigms
Various computing paradigms are used in IoT
to provide different services depending on diverse
application requirements. These paradigms can be
categorized into cloud computing, edge computing
(i.e., MEC, fog, and cloudlet), mobile ad hoc cloud
(MAC), and hybrid platforms. Cloud computing is
a centralized computing infrastructure that aims to
provide interruption-free access to powerful cloud
IEEE COMMUNICATIONS MAGAZINE 3
Taxonomy of IoT-based Edge Computing Environment
Major
Enablers
Computing
Nodes
Service Level
Objectives
Latency
Minimization
Network
Management
Cost
Optimization
Energy
Management
Network
Technologies
WiFi
3G
Servers
Base Stations
Routers
Vehicles Virtualization
Networking
Technologies
Software
Development
Kits
4G
5G
Computing
Paradigms
Fog
Computing
Cloudlets
MEC
Resource Rich
Network
Elements
Data Types
Non Real-
time
Soft Real-
time
Hard Real-
time
Applications
Smart Home
Health Care
Video
surveillance
Smart Grid
Smart Cities
Smart Logistics
Environment
Monitoring
Resource
Management
Data
Management
Hybrid
Computing
Low Latency
Proximity
Location
awareness
Dense
Geographical
Distribution
Network
Context
Awareness
Attributes
Bluetooth
Ethernet
Mobile
Ad hoc
Cloud
Cloud
Computing
Fig. 2: Taxonomy of IoT-based Edge Environment
servers. These servers can rapidly process large
amounts of data upon receipt from remote IoT
devices and send back the results. However, real-
time delay-sensitive applications cannot afford long
delays induced by a wide area network. Continuous
transmission of voluminous raw data through unreli-
able wireless links may also be ineffective. By con-
trast, edge computing is a decentralized computing
platform that brings cloud computing capabilities
near IoT devices, that is, the network edge. An
important type of edge computing platform is MEC,
which brings cloud computing capabilities to the
edge of a cellular network [10]. Computational and
storage services in MEC are provided at BS. Unlike
MEC, fog computing employs local fog nodes (i.e.,
local network devices, such as a router or switch)
available within a limited geographic region to pro-
vide computational services. Fog computing is con-
sidered a premier technology following the success
of IoT. Cloudlet is another form of edge computing,
in which delay-sensitive and computation-intensive
tasks from IoT devices are performed on a server
deployed in the local area network. Unlike cloud and
edge computing platforms that rely on infrastructure
deployment, MAC capitalizes the shared resources
of available mobile devices within local proxim-
ity to process computation-intensive tasks. Cloud
and edge computing are used together in hybrid
computing. Such infrastructure is usually adopted
when we require the large computing resources of
cloud computing but cannot tolerate the latency
of the cloud. Variants of edge computing can be
employed in such applications to overcome the
latency problems of cloud computing.
D. Service Level Objectives
The different service-level objectives for edge
computing in the context of IoT are as follows]:
1) Latency Minimization: High latency has be-
come a crucial problem for IoT-based smart ap-
plications. An alternative platform, such as edge
computing, that can guarantee timely delivery of
services is required to fulfill the quality of service
(QoS) requirements of delay-sensitive IoT applica-
tions (e.g., smart transportation and online gaming).
2) Network Management: A number of phenom-
ena, such as inadequate virtualization support, lack
of seamless connectivity, and inefficient congestion
control, degrade the overall network performance.
Therefore, efficient usage of network resources in
edge computing is vital for IoT.
3) Cost Optimization: The use of an adequate
platform for enabling edge computing necessitates
extensive infrastructure deployment that involves
substantial upfront investment and operational ex-
penses. Most of these expenses are related to net-
work node placement, which requires deliberate
IEEE COMMUNICATIONS MAGAZINE 4
planning and optimization to minimize the overall
cost. Deployment of an optimal number of nodes
at appropriate positions can significantly reduce
capital, and optimal arrangement of edge nodes can
minimize operational costs.
4) Energy Management: Energy management is
also an important objective of IoT-based edge com-
puting. Subscribers need to have strict control over
power management. Energy-efficient IoT devices
and applications are desirable in edge computing.
According to a study, one trillion IoT nodes need
sensing platforms that support various applications
using power harvesting to ensure scalability, reduce
costs, and avoid frequent battery replacement.
5) Resource Management: Optimal management
of computational resources is crucial in obtaining
service-level objectives. Appropriate resource man-
agement includes coordination of resources, estima-
tion of available resources, and proper allocation of
workload.
6) Data Management: The large number of IoT
devices at present are expected to generate large
amounts of data that need to be managed in a timely
manner. Efficient and effective data management
mechanisms are desirable in edge computing. Trans-
mission and aggregation of IoT-generated data are
important concerns in data management.
E. Major Enablers
The driving forces behind the success of edge
computing are different types of technologies.
Emerging network technologies, such as 4G and
cognitive radios, are vital in fulfilling the require-
ments of delay-sensitive applications. These com-
munication technologies are used in edge comput-
ing for device-to-device and device-to-edge server
communication. Software development kits with
appropriate application programming interfaces as-
sist in developing and integrating new compatible
applications and customizing existing applications
and services. Cloud computing utilizes powerful
servers for computation-intensive jobs; the same
idea has been envisioned to bring cloud capabilities
to the edge devices of networks to minimize latency.
Such servers can help offload computations from
small resource-limited mobile devices. Virtualiza-
tion is another emerging enabler that allows for
the creation of logically isolated resources using
similar physical resources. Virtualization is used by
different virtual machines for a number of cloud
computing services at the edge of networks.
F. Data Types
One of the primary reasons for edge computing is
that its precursor (i.e., cloud computing) was unable
to fulfill certain requirements of applications deal-
ing with various data types. These data types can
be broadly categorized based on delay sensitivity.
Hard real-time data cannot tolerate any delay at
all, whereas soft real-time data can afford several
bounded delays. Delay-tolerant applications can be
classified as non-real-time.
G. Applications
A number of applications currently use edge
computing.
1) Smart Homes: Smart homes equipped with
a number of IoT devices belong to an emerging
application domain of edge computing. The IoT
applications envisioned for the monitoring and me-
tering of smart homes will allow subscribers to
obtain automated and precise readings of different
meters and access invoices accordingly without de-
lay [11]. These IoT applications are designed for
remote monitoring and metering of various utilities,
such as water, electricity, and gas. The data collected
from IoT devices can be transmitted to an edge
server for processing instead of sending them to the
cloud, which can lead to real-time data analytics.
2) Healthcare: Edge computing has been suc-
cessfully implemented in recent years and is now
commonly used in different medical appliances.
Edge computing enables end users to monitor
and react to health-related data generated by var-
ious servers. Different architectures that use cloud,
fog, and edge computing have been proposed
to reap the benefits of collaborative computing
paradigms. Healthcare applications are usually con-
sidered delay-sensitive applications in IoT. Initially,
cloud computing was employed for healthcare ap-
plications but was not highly successful because of
latency issues. The introduction of edge computing
resolved these issues and made cloud computing
realistic for healthcare IoT applications.
3) Video Surveillance: Edge computing is cur-
rently used for smart video surveillance in different
sectors of life, including domestic security and
anti-terrorism. Different video contents are obtained
IEEE COMMUNICATIONS MAGAZINE 5
and shared from different video cameras and video
sensors. These videos are stored and efficiently
managed for further processing. Different security
applications can automatically extract the required
data from the archive of stored video contents.
Video surveillance is usually performed with the
collaboration of edge and cloud computing.
4) Smart Grid: Edge computing and IoT are
utilized in smart energy management. Such applica-
tions automatically observe consumption and distri-
bution patterns. Contributing nodes are used by edge
computing for real-time sensing and processing.
Cloud computing is also utilized as a collaborative
tool to make such applications robust and dynamic
for large amounts of data in the deployment of wide
area energy networks. Meanwhile, edge computing
is used for agility and load distribution.
5) Smart Cities: Edge computing in IoT can
assist in designing smart cities. Edge computing can
be effectively used in lighting control systems of
streets and roads, air and water quality monitoring,
exploring emergency routes in cases of disasters
or accidents, and automatic watering of different
gardens in cities.
6) Smart Logistics: Edge computing in the IoT
environment helps conventional logistics and offers
new fascinating possibilities that make the flow
management of things automated and easy. This
system enables a smooth flow of transaction be-
tween the product manufacturer and end consumer
in terms of cost and time. Apart from these appli-
cations, interested readers may refer to the work of
J. Pan and J. McElhannon presented in [12] that
discussed several edge cloud opportunities for IoT
applications.
7) Environment Monitoring: The collaborative
use of edge and cloud computing in IoT can en-
hance the quality of existing monitoring systems.
An automated system will collaborate with sensors
and actuators. Applications have been developed
for monitoring critical entities that exert a major
effect on the environment. These entities include
monitoring of gas concentration in air, water level
in lakes and underground, lighting condition, soil
humidity, and changes in land position. Environ-
ment monitoring is crucial in many fields, such as
agriculture, forestry, and food safety.
H. Attributes
Edge computing is characterized by certain at-
tributes, such as low latency, proximity, location
awareness, dense geographical distribution, and net-
work context information. Mobile operators, content
providers, and application developers can utilize
these favorable attributes in their corresponding
business domain by using them to enhance the qual-
ity of experience for mobile broadband subscribers.
III. KEY REQUIREMENTS OF EDGE COMPUTING
IN IOT
Successful deployment of edge computing in the
IoT environment has certain requirements. These
requirements are desirable features for the smooth
functionality of any edge computing application or
service. A system is considered user-friendly and
feasible when it fulfills the requirements enumerated
below. Notably, several of the requirements are
conflicting. Therefore, application designers must
maintain good balance among all of them by con-
sidering the environment.
A. Latency
Delay is one of the basic reasons for preferring
edge computing over cloud computing in delay-
sensitive applications. Many modern-day applica-
tions are delay-sensitive and perform computation
on real-time data. Bringing many services and ap-
plications from the cloud to the edge of the net-
work drastically reduces the latency of IoT appli-
cations. Low latency enables real-time communica-
tion, which leads to improved decision making in
IoT-based edge computing.
B. Reliability
Edge computing is envisioned to be used in
almost every field of life. Edge computing plays
several roles in critical fields where it is used,
such as healthcare and banking, which require a
reliable system. Reliability is a critical requirement
of any edge computing system to make the system
a practical choice for real-life IoT applications of
smart computing.
IEEE COMMUNICATIONS MAGAZINE 6
C. Mobility Support
In IoT, different types of devices are utilized
for different architectures. Mobility techniques are
frequently used in different cloud and edge architec-
tures and are gaining popularity in applications em-
ployed in hybrid infrastructures. In infrastructures
with mobile devices, mobility control is always an
issue. Meanwhile, mobility support is mandatory for
certain edge applications. The provision of mobil-
ity is important for direct communication between
different modules and for message exchange among
different mobile devices.
D. Real-time interactions
Real-time applications are gaining popularity in
all fields of communication. In IoT, certain edge
applications require real-time interaction. Other op-
tions, such as batch processing, are available but
may not be suitable for many modern applications
in IoT that use edge computing, such as healthcare
systems and many other critical and time-sensitive
applications.
E. Security
Security is one of the core requirements of all
modern systems. The use of edge computing in IoT
is subject to developing secure systems and applica-
tions. The security requirement is almost undefined
in cloud computing; therefore, cloud services are
vulnerable to certain types of attacks. Cloud com-
puting services are easy targets of security threats
and data breaches because of their specific structure.
However, in edge computing, security should be
well defined and clearly implemented. Therefore,
improved data security can be provided because
client data are aggregated at certain access points
placed closed to the end user.
F. Interoperability
Interoperability is a key requirement in infor-
mation technology and telecommunication. Appli-
cations and services developed for IoT-based edge
computing must be interoperable to ensure compati-
bility with other applications and hardware compo-
nents. Several of the key requirements above are
mentioned in the perspective of IoT. This set of
requirements is not a full and complete list. Other
requirements may be applied in different applica-
tions.
IV. ROLE OF EDGE COMPUTING IN THE
INTERNET OF THINGS
Edge computing is expected act as a strategic
brain behind IoT. Identifying the role of edge com-
puting in IoT is the main research issue at present.
Edge computing is utilized to reduce the amount
of data sent to the cloud and decrease service
access latency. Figure 3 illustrates the complimen-
tary role of edge and cloud computing in the IoT
environment. In this section, several major roles of
edge computing are discussed with IoT scenario
examples.
A. Data Acquisition
Edge devices, including sensors or machines,
can capture streaming data for rapid analysis and
perform immediate actions or processing of the
data. According to Beckman, we are moving the
algorithm to the data, not the data to the algorithm.
Consequently, we can increase productivity and
prevent product defects efficiently and rapidly. In a
smart transportation scenario, traffic light cameras
can not only capture data but also analyze the
collected data and make immediate decisions on
their own to improve the flow of vehicles.
B. Inferential Controls
Inferential controls are key components of any
edge device. They refer to the capacity of a device to
interpret things in its environment accurately. These
controls also communicate with an infrastructure
that is controlled by other entities. However, bring-
ing inferential capability to edge devices is difficult
because it depends on contextual information. In a
smart transportation scenario, this inference ability
can provide drivers with highly intelligent naviga-
tion instructions by using GPS and front and back
cameras.
C. Data Analysis
Edge computing enables real-time data analysis.
Analyzing data in the place of data generation
can reduce the latency of information generation
from the collected data. Therefore, edge devices can
collect and analyze data from surrounding devices,
thus allowing decision makers to deliver actionable
insights faster than before. Edge devices can also
help reduce network bandwidth and cost because
IEEE COMMUNICATIONS MAGAZINE 7
Smart Cars
Offices
Factories
Human Smart
Gadgets
Thermal
Power
Cloud
Edge
Server
Edge
Server
Edge
Server
Edge
Server
Edge
Server
Fig. 3: Illustration of Edge Cloud Computing Complimentary Role in IoT Environment
data will be locally analyzed. This can be helpful for
many organizations in many industries, including
manufacturing, healthcare, telecommunication, and
finance, such that the need for the IoT concept
increases. Therefore, instead of traffic light cameras
sending data to a central infrastructure for data anal-
ysis, they can analyze streaming data themselves,
communicate with other devices, and make imme-
diate decisions to accomplish the required tasks.
D. Decision Making
After locally analyzing the data, the next step for
edge devices is to make critical strategic decisions.
In a smart transportation system, each car generates
a large amount of data every second and requires
real-time processing and correct decisions. For real-
time processing, the data cannot be sent to the cloud
for processing and decision making because the
response time would be too long in this case. In
such a case, the data should be analyzed locally
on any edge device. In this manner, the car can
make a correct decision on the spot to avoid adverse
situations.
E. Enhanced Data Security
When data are sent abroad for data processing,
data insecurity is increased. Data collection and
analysis are performed locally in edge computing.
Extensive routing is not involved, such that identi-
fying any suspicious activity is easy. Implementing
necessary actions before any security breach occurs
also becomes easy.
V. OPEN RESEARCH CHALLENGES
The following discussion highlights the open re-
search challenges in the deployment of edge cloud
in the IoT environment.
A. Heterogeneity
Heterogeneity in the IoT-based edge computing
environment exists in computing and communica-
tion technologies. Computing platforms can have
different operating systems and hardware architec-
tures, whereas communication technologies can be
heterogeneous with regard to data rate, transmission
range, and bandwidth. One of the challenges in edge
computing is to develop a solution in software space
that is portable across different environments. This
IEEE COMMUNICATIONS MAGAZINE 8
challenge is crucial because various applications
are deployed in edge devices. Several researchers
have proposed software solutions to resolve this
issue, but all of these solutions are hardware spe-
cific. Thus, they cannot resolve the problem in
heterogeneous environments. To solve this issue,
programmers should develop a programming model
for edge nodes that is supported by task- and data-
level parallelism to facilitate the execution of work-
loads simultaneously at multiple hardware levels.
The second consideration is to use a language that
supports hardware heterogeneity.
B. Standard Protocols and Interfaces
Edge computing is an emerging technology in
the IoT field. In this heterogeneous environment,
different devices and sensors connect and commu-
nicate with one another and with the edge server via
communication protocols. These devices have their
own interfaces and thus demand specific communi-
cation protocols. Considering that different vendors
manufacture different devices in the IoT environ-
ment, standard protocols and interfaces should be
developed to enable communication among these
heterogeneous devices. The development of stan-
dard protocols and interfaces in the IoT environment
is challenging because of the rapid development of
new devices.
C. Availability
Availability in the IoT-based edge computing
environment includes hardware- and software-level
provision of resources and services anywhere and
anytime for subscribed IoT devices. Usually, avail-
ability comprises three factors, namely, mean time
between failure, failure probability, and mean time
to recovery. Ensuring the availability of resources
and services for the growing number of IoT devices
is a challenging research perspective. However,
availability can be optimized by maximizing the
mean time between failures and minimizing the
failure probability and mean time to recovery.
D. Data Abstraction
With IoT, a number of data-generating devices
are connected in the network, and all of these data
generators report tremendously large raw data to the
edge device. For the edge device, analyzing such big
data is computationally difficult. Security risks are
also involved. Therefore, the data should be pre-
processed at the gateway level, such as noise/low-
quality removal, event detection, and privacy protec-
tion. The processed data will be sent to the upper
layer for future service provision. However, many
challenges may occur in this process. For privacy
and security purposes, applications running on edge
devices should be blind to these raw data. Therefore,
the details of the data should be removed during
data preprocessing. However, the usability of the
data can be affected by hiding the details of sensed
data. Defining the extent to which the raw data
should be filtered out is also a challenge because
several applications cannot obtain accurate results
from such data.
E. Security and Privacy
Edge computing acts as a boon to cybersecurity
because data do not travel over a network. However,
a highly dynamic environment at the edge of a
network makes the network unprotected. Given that
different devices are connected in IoT, a large array
of potential security threats can be generated. Many
applications are running at the network edge, so the
data provided to these applications should be in a
hidden form. Otherwise, any intruder can use the
open data for illegal purposes. For example, if a
home is connected to IoT, then private data, such as
individual health data, can be stolen. In this case,
how to support the service without harming privacy
is a challenge. Applications running on edge devices
should be blind to the raw data. Personal data
can be removed before reaching the edge device.
Several solutions have been provided by researchers
to standardize and store health data [13]. X. Sun
et al. [14] proposed a hierarchical fog computing
framework called EdgeIoT. This framework uses a
proxy virtual machine for securing the privacy of
user content and reducing data traffic in the core
network. However, security features with enhanced
robustness should be implemented on edge nodes.
VI. CONCLUSION
In this article, we investigated, highlighted, and
reported recent premier advances in edge comput-
ing technologies (e.g., fog computing, MEC, and
cloudlets) with respect to measuring their effect on
IoT. Then, we categorized edge computing literature
IEEE COMMUNICATIONS MAGAZINE 9
by devising a taxonomy, which was used to uncover
the premium features of edge computing that can be
beneficial to the IoT paradigm. We outlined a few
key requirements for the deployment of edge com-
puting in IoT and discussed indispensable scenarios
of edge computing in IoT. Furthermore, several open
research challenges to the successful deployment of
edge computing in IoT are identified and discussed.
We conclude that although the deployment of edge
computing in IoT provides numerous benefits, the
convergence of these two computing paradigms
brings about new issues that should be resolved in
the future.
ACKNOWLEDGEMENTS
Imran’s work is supported by the Deanship of
Scientific Research at King Saud University through
Research group No. (RG # 1435-051).
REFERENCES
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
M. Ayyash, “Internet of things: A survey on enabling tech-
nologies, protocols, and applications,” IEEE Communications
Surveys Tutorials, vol. 17, no. 4, pp. 2347–2376, Fourthquarter
2015.
[2] M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen,
K. Ha, W. Hu, and B. Amos, “Edge analytics in the internet of
things,” IEEE Pervasive Computing, vol. 14, no. 2, pp. 24–31,
2015.
[3] M. Jia, J. Cao, and W. Liang, “Optimal cloudlet placement
and user to cloudlet allocation in wireless metropolitan area
networks,” IEEE Transactions on Cloud Computing, vol. 5,
no. 4, pp. 725–737, Oct 2017.
[4] S. Yi, C. Li, and Q. Li, “A survey of fog computing: concepts,
applications and issues,” in Proceedings of the 2015 Workshop
on Mobile Big Data. ACM, 2015, pp. 37–42.
[5] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck,
“Mobile edge computing potential in making cities smarter,”
IEEE Communications Magazine, vol. 55, no. 3, pp. 38–43,
March 2017.
[6] M. Satyanarayanan, “The emergence of edge computing,” Com-
puter, vol. 50, no. 1, pp. 30–39, 2017.
[7] E. K. Markakis, I. Politis, A. Lykourgiotis, Y. Rebahi, G. Mas-
torakis, C. X. Mavromoustakis, and E. Pallis, “Efficient next
generation emergency communications over multi-access edge
computing,” IEEE Communications Magazine, vol. 55, no. 11,
pp. 92–97, NOVEMBER 2017.
[8] P. Mach and Z. Becvar, “Mobile edge computing: A survey
on architecture and computation offloading,” IEEE Commu-
nications Surveys Tutorials, vol. 19, no. 3, pp. 1628–1656,
thirdquarter 2017.
[9] E. Ahmed, A. Ahmed, I. Yaqoob, J. Shuja, A. Gani, M. Imran,
and M. Shoaib, “Bringing computation closer toward the user
network: Is edge computing the solution?” IEEE Communica-
tions Magazine, vol. 55, no. 11, pp. 138–144, 2017.
[10] X. Huang, R. Yu, J. Kang, Y. He, and Y. Zhang, “Exploring
mobile edge computing for 5g-enabled software defined vehic-
ular networks,” IEEE Wireless Communications, vol. 24, no. 6,
pp. 55–63, Dec 2017.
[11] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani,
“Internet-of-things-based smart environments: state of the art,
taxonomy, and open research challenges,” IEEE Wireless Com-
munications, vol. 23, no. 5, pp. 10–16, 2016.
[12] J. Pan and J. McElhannon, “Future edge cloud and edge
computing for internet of things applications,” IEEE Internet
of Things Journal, vol. 5, no. 1, pp. 439–449, Feb 2018.
[13] F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma,
“Fog computing in healthcare–a review and discussion,” IEEE
Access, vol. 5, pp. 9206–9222, 2017.
[14] X. Sun and N. Ansari, “Edgeiot: Mobile edge computing for the
internet of things,” IEEE Communications Magazine, vol. 54,
no. 12, pp. 22–29, 2016.
PLACE
PHOTO
HERE
Najmul Hassan was born in 1983 in Ab-
bottabad, Pakistan. He did his MS in Com-
puter Sciences from Mohammad Ali Jinnah
University, Islamabad, Pakistan in 2010. He is
currently working in collaboration with Dr. Jin
Li, School of Computer Science Guangzhou
University China. His research areas are In-
ternet of Things, Edge/Cloud Communication,
Wireless Body Area Networks and Wireless
Sensor Networks.
PLACE
PHOTO
HERE
Saira Gillani received her PhD degree in
Information Sciences from Corvinus Univer-
sity of Budapest, Hungary in december 2015.
She is currently serving as an assistant pro-
fessor in Saudi Electronic University, Jed-
dah, Saudi Arabia. Previously, she worked
as research scholar in Corvinno, Technology
Transfer Center of Information Technology
and Services in Budapest, Hungary. Her areas
of interest include Text Mining, Data Mining, Machine Learning,
VANET, Mobile Edge Computing and Internet of Things.
PLACE
PHOTO
HERE
Ejaz Ahmed (S’13, M’17) received his
Ph.D. (Computer Science) from University of
Malaya, Kuala Lumpur, Malaysia in 2016. He
is an associate editor of IEEE Communication
Magazine, IEEE Access, KSII TIIS, Elsevier
JNCA and Elsevier FGCS. His areas of interest
include Big Data, Mobile Cloud Computing,
Mobile Edge Computing, Internet of Things,
and Cognitive Radio Networks. He has also
received a number of awards during his research career.
IEEE COMMUNICATIONS MAGAZINE 10
PLACE
PHOTO
HERE
Ibrar Yaqoob received his Ph.D. (Com-
puter Science) from the University of Malaya,
Malaysia, in 2017. He has published a num-
ber of research articles in refereed interna-
tional journals and magazines. His numerous
research articles are very famous and among
the most downloaded in top journals. His re-
search interests include big data, mobile cloud,
the Internet of Things, cloud computing, and
wireless networks.
PLACE
PHOTO
HERE
Muhammad Imran is currently working
at King Saud University and visiting scien-
tist with Iowa State University. His research
interest includes MANET, WSNs, WBANs,
M2M/IoT, SDN, Security and privacy. He has
published number of research papers in ref-
ereed international conferences and journals.
He serves as a Co-Editor in Chief for EAI
Transactions and Associate/Guest editor for
IEEE (Access, Communications Magazine), Computer Networks,
Sensors, IJDSN, JIT, WCMC, AHSWN, IET WSS, IJAACS and
IJITEE.

Weitere ähnliche Inhalte

Was ist angesagt?

IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Ahmed Banafa
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Fastly
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Tyrone Systems
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT StackPubNub
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architectureMachinePulse
 
Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Cisco Canada
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael Enescu
 
IoT Stream Conf Keynote: Past, Present and Future of IoT
IoT Stream Conf Keynote: Past, Present and Future of IoTIoT Stream Conf Keynote: Past, Present and Future of IoT
IoT Stream Conf Keynote: Past, Present and Future of IoTrICh morrow
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesMarkus Van Kempen
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation Assem mousa
 

Was ist angesagt? (20)

IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
 
IoT Stream Conf Keynote: Past, Present and Future of IoT
IoT Stream Conf Keynote: Past, Present and Future of IoTIoT Stream Conf Keynote: Past, Present and Future of IoT
IoT Stream Conf Keynote: Past, Present and Future of IoT
 
Tec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examplesTec118 Teched2015 IOT use case and examples
Tec118 Teched2015 IOT use case and examples
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 

Ähnlich wie IoT's Edge Computing Role

A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionEnsemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionIJCNCJournal
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingIRJET Journal
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdfIjictTeam
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET Journal
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
 

Ähnlich wie IoT's Edge Computing Role (20)

A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionEnsemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
20476-38939-1-PB.pdf
20476-38939-1-PB.pdf20476-38939-1-PB.pdf
20476-38939-1-PB.pdf
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge Computing
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...
 

Mehr von suthi

Object Oriented Programming -- Dr Robert Harle
Object Oriented Programming -- Dr Robert HarleObject Oriented Programming -- Dr Robert Harle
Object Oriented Programming -- Dr Robert Harlesuthi
 
Document Classification Using KNN with Fuzzy Bags of Word Representation
Document Classification Using KNN with Fuzzy Bags of Word RepresentationDocument Classification Using KNN with Fuzzy Bags of Word Representation
Document Classification Using KNN with Fuzzy Bags of Word Representationsuthi
 
AUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTESAUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTESsuthi
 
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTES
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTESOBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTES
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTESsuthi
 
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTES
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTESPARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTES
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTESsuthi
 
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTES
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTESSOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTES
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTESsuthi
 
COMPUTER HARDWARE - SHORT NOTES
COMPUTER HARDWARE - SHORT NOTESCOMPUTER HARDWARE - SHORT NOTES
COMPUTER HARDWARE - SHORT NOTESsuthi
 
DATA BASE MANAGEMENT SYSTEM - SHORT NOTES
DATA BASE MANAGEMENT SYSTEM - SHORT NOTESDATA BASE MANAGEMENT SYSTEM - SHORT NOTES
DATA BASE MANAGEMENT SYSTEM - SHORT NOTESsuthi
 
OPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESOPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESsuthi
 
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTES
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTESSOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTES
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTESsuthi
 
ALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTESALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTESsuthi
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
DATA STRUCTURES - SHORT NOTES
DATA STRUCTURES - SHORT NOTESDATA STRUCTURES - SHORT NOTES
DATA STRUCTURES - SHORT NOTESsuthi
 
ARTIFICIAL INTELLIGENCE - SHORT NOTES
ARTIFICIAL INTELLIGENCE - SHORT NOTESARTIFICIAL INTELLIGENCE - SHORT NOTES
ARTIFICIAL INTELLIGENCE - SHORT NOTESsuthi
 
LIGHT PEAK
LIGHT PEAKLIGHT PEAK
LIGHT PEAKsuthi
 
Action Recognition using Nonnegative Action
Action Recognition using Nonnegative ActionAction Recognition using Nonnegative Action
Action Recognition using Nonnegative Actionsuthi
 
C Programming Tutorial
C Programming TutorialC Programming Tutorial
C Programming Tutorialsuthi
 
Data structure - mcqs
Data structure - mcqsData structure - mcqs
Data structure - mcqssuthi
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems pptsuthi
 
Data base management systems question paper
Data base management systems question paperData base management systems question paper
Data base management systems question papersuthi
 

Mehr von suthi (20)

Object Oriented Programming -- Dr Robert Harle
Object Oriented Programming -- Dr Robert HarleObject Oriented Programming -- Dr Robert Harle
Object Oriented Programming -- Dr Robert Harle
 
Document Classification Using KNN with Fuzzy Bags of Word Representation
Document Classification Using KNN with Fuzzy Bags of Word RepresentationDocument Classification Using KNN with Fuzzy Bags of Word Representation
Document Classification Using KNN with Fuzzy Bags of Word Representation
 
AUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTESAUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTES
 
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTES
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTESOBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTES
OBJECT ORIENTED PROGRAMMING LANGUAGE - SHORT NOTES
 
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTES
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTESPARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTES
PARALLEL ARCHITECTURE AND COMPUTING - SHORT NOTES
 
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTES
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTESSOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTES
SOFTWARE QUALITY ASSURANCE AND TESTING - SHORT NOTES
 
COMPUTER HARDWARE - SHORT NOTES
COMPUTER HARDWARE - SHORT NOTESCOMPUTER HARDWARE - SHORT NOTES
COMPUTER HARDWARE - SHORT NOTES
 
DATA BASE MANAGEMENT SYSTEM - SHORT NOTES
DATA BASE MANAGEMENT SYSTEM - SHORT NOTESDATA BASE MANAGEMENT SYSTEM - SHORT NOTES
DATA BASE MANAGEMENT SYSTEM - SHORT NOTES
 
OPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESOPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTES
 
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTES
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTESSOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTES
SOFTWARE ENGINEERING & ARCHITECTURE - SHORT NOTES
 
ALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTESALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTES
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
DATA STRUCTURES - SHORT NOTES
DATA STRUCTURES - SHORT NOTESDATA STRUCTURES - SHORT NOTES
DATA STRUCTURES - SHORT NOTES
 
ARTIFICIAL INTELLIGENCE - SHORT NOTES
ARTIFICIAL INTELLIGENCE - SHORT NOTESARTIFICIAL INTELLIGENCE - SHORT NOTES
ARTIFICIAL INTELLIGENCE - SHORT NOTES
 
LIGHT PEAK
LIGHT PEAKLIGHT PEAK
LIGHT PEAK
 
Action Recognition using Nonnegative Action
Action Recognition using Nonnegative ActionAction Recognition using Nonnegative Action
Action Recognition using Nonnegative Action
 
C Programming Tutorial
C Programming TutorialC Programming Tutorial
C Programming Tutorial
 
Data structure - mcqs
Data structure - mcqsData structure - mcqs
Data structure - mcqs
 
Data base management systems ppt
Data base management systems pptData base management systems ppt
Data base management systems ppt
 
Data base management systems question paper
Data base management systems question paperData base management systems question paper
Data base management systems question paper
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

IoT's Edge Computing Role

  • 1. IEEE COMMUNICATIONS MAGAZINE 1 The role of edge computing in Internet of Things Najmul Hassan, Saira Gillani, Member, IEEE, Ejaz Ahmed, Member, IEEE, Ibrar Yaqoob, Member, IEEE, Muhammad Imran, Member, IEEE Abstract—Remarkable advancements in embedded systems-on-a-chip have significantly increased the number of commercial devices that possess sufficient resources to run full-fledged operating systems. This increment has extended the potential of the Internet of Things (IoT). Many early IoT devices could only collect and send data for analysis. However, the increasing computing capacity of today’s devices allow them to perform complex computations on-site, resulting in edge computing. Edge computing extends cloud computing capabilities by bringing services close to the edge of a network and thus supports a new variety of services and applications. In this work, we investigate, highlight, and report recent advances in edge computing technologies with respect to measuring their impact on IoT. We establish a taxonomy of edge computing by classifying and categorizing existing literature, and by doing so, we reveal the salient and supportive features of different edge computing paradigms for IoT. Moreover, we present the key requirements for the successful deployment of edge computing in IoT and discuss a few indispensable scenarios of edge computing in IoT. Several open research challenges are also outlined. Index Terms—Internet of Things, Edge Computing, Fog Computing, Mobile Edge Computing, Cloudlets I. INTRODUCTION Billions of smart devices can now connect to the Internet in the form of the Internet of Things (IoT) due to advancements in networking technologies [1]. According to a Cisco report, these devices will generate 507.9 ZB of data by 2019. Data generated N. Hassan is with COMSATS University Islamabad, Attock Cam- pus. (Email: sardarnajam83@gmail.com) S. Gillani is with the College of Computing and Informat- ics, Saudi Electronic University, Jeddah, Saudi Arabia. (Email: saira.a.gillani@ieee.org) E. Ahmed and I. Yaqoob are with the Centre for Mobile Cloud Computing Research, University of Malaya, Malaysia. (Email: ejazahmed@ieee.org, ibraryaqoob@ieee.org) M. Imran is with the College of Computer and Informa- tion Sciences, King Saud University, Saudi Arabia. (Email: dr.m.imran@ieee.org) Corresponding Authors: Ejaz Ahmed and Muhammad Imran by IoT-devices are essential for organizations that are interested in improving their productivity and revenues. However, management and analysis of such large amounts of data are cumbersome and challenging for organizations that rely on conven- tional computing paradigms. Edge computing is gaining popularity in this context because IoT is becoming common in processing data on the edge of networks [2]. Given that data are rapidly produced at the edge of networks, dealing with these data at the edge of the network would be effective. Several approaches, such as cloudlet [3], fog computing [4], and mobile edge computing (MEC) [5], provide complementary solutions to cloud computing to reduce data process- ing on the network edge. In short, edge computing is a general term that represents fog computing, MEC, cloudlets, and micro clouds. Storage, computing, and power are regarded as being on the edge of networks to increase availability, reduce latency, and eventually overcome cloud computing issues [6]. Edge computing facilitates the processing of delay- sensitive and bandwidth-hungry applications near the data source [7]. Figure 1 illustrates a layered model for cloud edge-based IoT service delivery. Although several studies have been conducted on different edge computing paradigms (i.e., fog, edge, and cloudlets) [8] [9] [3], no study has examined all of the previously mentioned edge computing paradigms in terms of IoT. Research in this direction should be conducted because of the significance of the emerging paradigm of edge computing and its role in the success of IoT. This study highlights the role of edge computing in the IoT context. The contributions of this work are manifold. • We investigate, highlight, and report recent premier advances in edge computing from the IoT perspective. • We categorize and classify edge computing literature by devising a taxonomy. • We outline key requirements for the successful deployment of edge computing in IoT.
  • 2. IEEE COMMUNICATIONS MAGAZINE 2 Smart IoT Devices Edge Gateways Cloud Data Centers Layered Model for Cloud Edge-based IoT Service Delivery Hundreds Thousands M illions Fig. 1: Layered Model for Cloud Edge-based IoT Services Delivery • We present a few indispensable scenarios of edge computing in IoT. • We identify and elaborate several open research challenges. These contributions are discussed separately in Sections II to V. The concluding remarks are pro- vided in Section VI. II. TAXONOMY OF IOT-BASED EDGE COMPUTING Figure 2 depicts a taxonomy of IoT-based edge computing that considers particular features, such as wireless network technologies, computing nodes, computing paradigms, service level objectives, ma- jor enablers, data types, applications, and attributes. A. Network Technologies IoT devices send collected data to a locally avail- able edge server for processing. These devices com- municate with edge computing platforms through ei- ther wireless networking technologies, such as WiFi and cellular networking (e.g., 3G, 4G, and 5G), or wired technologies, such as Ethernet. These network technologies vary in terms of data rate, transmission range, and number of supported devices. Wireless networks provide flexibility and mobility to users who execute their applications on the edge server. However, wireless network technologies are not as reliable as wired technologies. B. Computing Nodes IoT devices have limited processing capabili- ties, which make them unsuitable for computation- intensive tasks. However, resource-constrained IoT devices can augment their capabilities by leveraging the resources of edge servers. The edge computing paradigm relies on different computational devices to provide services to IoT users. These computa- tional devices are the core element of IoT-based edge computing. Computing nodes include servers, base stations (BS), routers, and vehicles that can provide resources and various services to IoT de- vices. The use of these devices is specific to the computing paradigm. C. Computing Paradigms Various computing paradigms are used in IoT to provide different services depending on diverse application requirements. These paradigms can be categorized into cloud computing, edge computing (i.e., MEC, fog, and cloudlet), mobile ad hoc cloud (MAC), and hybrid platforms. Cloud computing is a centralized computing infrastructure that aims to provide interruption-free access to powerful cloud
  • 3. IEEE COMMUNICATIONS MAGAZINE 3 Taxonomy of IoT-based Edge Computing Environment Major Enablers Computing Nodes Service Level Objectives Latency Minimization Network Management Cost Optimization Energy Management Network Technologies WiFi 3G Servers Base Stations Routers Vehicles Virtualization Networking Technologies Software Development Kits 4G 5G Computing Paradigms Fog Computing Cloudlets MEC Resource Rich Network Elements Data Types Non Real- time Soft Real- time Hard Real- time Applications Smart Home Health Care Video surveillance Smart Grid Smart Cities Smart Logistics Environment Monitoring Resource Management Data Management Hybrid Computing Low Latency Proximity Location awareness Dense Geographical Distribution Network Context Awareness Attributes Bluetooth Ethernet Mobile Ad hoc Cloud Cloud Computing Fig. 2: Taxonomy of IoT-based Edge Environment servers. These servers can rapidly process large amounts of data upon receipt from remote IoT devices and send back the results. However, real- time delay-sensitive applications cannot afford long delays induced by a wide area network. Continuous transmission of voluminous raw data through unreli- able wireless links may also be ineffective. By con- trast, edge computing is a decentralized computing platform that brings cloud computing capabilities near IoT devices, that is, the network edge. An important type of edge computing platform is MEC, which brings cloud computing capabilities to the edge of a cellular network [10]. Computational and storage services in MEC are provided at BS. Unlike MEC, fog computing employs local fog nodes (i.e., local network devices, such as a router or switch) available within a limited geographic region to pro- vide computational services. Fog computing is con- sidered a premier technology following the success of IoT. Cloudlet is another form of edge computing, in which delay-sensitive and computation-intensive tasks from IoT devices are performed on a server deployed in the local area network. Unlike cloud and edge computing platforms that rely on infrastructure deployment, MAC capitalizes the shared resources of available mobile devices within local proxim- ity to process computation-intensive tasks. Cloud and edge computing are used together in hybrid computing. Such infrastructure is usually adopted when we require the large computing resources of cloud computing but cannot tolerate the latency of the cloud. Variants of edge computing can be employed in such applications to overcome the latency problems of cloud computing. D. Service Level Objectives The different service-level objectives for edge computing in the context of IoT are as follows]: 1) Latency Minimization: High latency has be- come a crucial problem for IoT-based smart ap- plications. An alternative platform, such as edge computing, that can guarantee timely delivery of services is required to fulfill the quality of service (QoS) requirements of delay-sensitive IoT applica- tions (e.g., smart transportation and online gaming). 2) Network Management: A number of phenom- ena, such as inadequate virtualization support, lack of seamless connectivity, and inefficient congestion control, degrade the overall network performance. Therefore, efficient usage of network resources in edge computing is vital for IoT. 3) Cost Optimization: The use of an adequate platform for enabling edge computing necessitates extensive infrastructure deployment that involves substantial upfront investment and operational ex- penses. Most of these expenses are related to net- work node placement, which requires deliberate
  • 4. IEEE COMMUNICATIONS MAGAZINE 4 planning and optimization to minimize the overall cost. Deployment of an optimal number of nodes at appropriate positions can significantly reduce capital, and optimal arrangement of edge nodes can minimize operational costs. 4) Energy Management: Energy management is also an important objective of IoT-based edge com- puting. Subscribers need to have strict control over power management. Energy-efficient IoT devices and applications are desirable in edge computing. According to a study, one trillion IoT nodes need sensing platforms that support various applications using power harvesting to ensure scalability, reduce costs, and avoid frequent battery replacement. 5) Resource Management: Optimal management of computational resources is crucial in obtaining service-level objectives. Appropriate resource man- agement includes coordination of resources, estima- tion of available resources, and proper allocation of workload. 6) Data Management: The large number of IoT devices at present are expected to generate large amounts of data that need to be managed in a timely manner. Efficient and effective data management mechanisms are desirable in edge computing. Trans- mission and aggregation of IoT-generated data are important concerns in data management. E. Major Enablers The driving forces behind the success of edge computing are different types of technologies. Emerging network technologies, such as 4G and cognitive radios, are vital in fulfilling the require- ments of delay-sensitive applications. These com- munication technologies are used in edge comput- ing for device-to-device and device-to-edge server communication. Software development kits with appropriate application programming interfaces as- sist in developing and integrating new compatible applications and customizing existing applications and services. Cloud computing utilizes powerful servers for computation-intensive jobs; the same idea has been envisioned to bring cloud capabilities to the edge devices of networks to minimize latency. Such servers can help offload computations from small resource-limited mobile devices. Virtualiza- tion is another emerging enabler that allows for the creation of logically isolated resources using similar physical resources. Virtualization is used by different virtual machines for a number of cloud computing services at the edge of networks. F. Data Types One of the primary reasons for edge computing is that its precursor (i.e., cloud computing) was unable to fulfill certain requirements of applications deal- ing with various data types. These data types can be broadly categorized based on delay sensitivity. Hard real-time data cannot tolerate any delay at all, whereas soft real-time data can afford several bounded delays. Delay-tolerant applications can be classified as non-real-time. G. Applications A number of applications currently use edge computing. 1) Smart Homes: Smart homes equipped with a number of IoT devices belong to an emerging application domain of edge computing. The IoT applications envisioned for the monitoring and me- tering of smart homes will allow subscribers to obtain automated and precise readings of different meters and access invoices accordingly without de- lay [11]. These IoT applications are designed for remote monitoring and metering of various utilities, such as water, electricity, and gas. The data collected from IoT devices can be transmitted to an edge server for processing instead of sending them to the cloud, which can lead to real-time data analytics. 2) Healthcare: Edge computing has been suc- cessfully implemented in recent years and is now commonly used in different medical appliances. Edge computing enables end users to monitor and react to health-related data generated by var- ious servers. Different architectures that use cloud, fog, and edge computing have been proposed to reap the benefits of collaborative computing paradigms. Healthcare applications are usually con- sidered delay-sensitive applications in IoT. Initially, cloud computing was employed for healthcare ap- plications but was not highly successful because of latency issues. The introduction of edge computing resolved these issues and made cloud computing realistic for healthcare IoT applications. 3) Video Surveillance: Edge computing is cur- rently used for smart video surveillance in different sectors of life, including domestic security and anti-terrorism. Different video contents are obtained
  • 5. IEEE COMMUNICATIONS MAGAZINE 5 and shared from different video cameras and video sensors. These videos are stored and efficiently managed for further processing. Different security applications can automatically extract the required data from the archive of stored video contents. Video surveillance is usually performed with the collaboration of edge and cloud computing. 4) Smart Grid: Edge computing and IoT are utilized in smart energy management. Such applica- tions automatically observe consumption and distri- bution patterns. Contributing nodes are used by edge computing for real-time sensing and processing. Cloud computing is also utilized as a collaborative tool to make such applications robust and dynamic for large amounts of data in the deployment of wide area energy networks. Meanwhile, edge computing is used for agility and load distribution. 5) Smart Cities: Edge computing in IoT can assist in designing smart cities. Edge computing can be effectively used in lighting control systems of streets and roads, air and water quality monitoring, exploring emergency routes in cases of disasters or accidents, and automatic watering of different gardens in cities. 6) Smart Logistics: Edge computing in the IoT environment helps conventional logistics and offers new fascinating possibilities that make the flow management of things automated and easy. This system enables a smooth flow of transaction be- tween the product manufacturer and end consumer in terms of cost and time. Apart from these appli- cations, interested readers may refer to the work of J. Pan and J. McElhannon presented in [12] that discussed several edge cloud opportunities for IoT applications. 7) Environment Monitoring: The collaborative use of edge and cloud computing in IoT can en- hance the quality of existing monitoring systems. An automated system will collaborate with sensors and actuators. Applications have been developed for monitoring critical entities that exert a major effect on the environment. These entities include monitoring of gas concentration in air, water level in lakes and underground, lighting condition, soil humidity, and changes in land position. Environ- ment monitoring is crucial in many fields, such as agriculture, forestry, and food safety. H. Attributes Edge computing is characterized by certain at- tributes, such as low latency, proximity, location awareness, dense geographical distribution, and net- work context information. Mobile operators, content providers, and application developers can utilize these favorable attributes in their corresponding business domain by using them to enhance the qual- ity of experience for mobile broadband subscribers. III. KEY REQUIREMENTS OF EDGE COMPUTING IN IOT Successful deployment of edge computing in the IoT environment has certain requirements. These requirements are desirable features for the smooth functionality of any edge computing application or service. A system is considered user-friendly and feasible when it fulfills the requirements enumerated below. Notably, several of the requirements are conflicting. Therefore, application designers must maintain good balance among all of them by con- sidering the environment. A. Latency Delay is one of the basic reasons for preferring edge computing over cloud computing in delay- sensitive applications. Many modern-day applica- tions are delay-sensitive and perform computation on real-time data. Bringing many services and ap- plications from the cloud to the edge of the net- work drastically reduces the latency of IoT appli- cations. Low latency enables real-time communica- tion, which leads to improved decision making in IoT-based edge computing. B. Reliability Edge computing is envisioned to be used in almost every field of life. Edge computing plays several roles in critical fields where it is used, such as healthcare and banking, which require a reliable system. Reliability is a critical requirement of any edge computing system to make the system a practical choice for real-life IoT applications of smart computing.
  • 6. IEEE COMMUNICATIONS MAGAZINE 6 C. Mobility Support In IoT, different types of devices are utilized for different architectures. Mobility techniques are frequently used in different cloud and edge architec- tures and are gaining popularity in applications em- ployed in hybrid infrastructures. In infrastructures with mobile devices, mobility control is always an issue. Meanwhile, mobility support is mandatory for certain edge applications. The provision of mobil- ity is important for direct communication between different modules and for message exchange among different mobile devices. D. Real-time interactions Real-time applications are gaining popularity in all fields of communication. In IoT, certain edge applications require real-time interaction. Other op- tions, such as batch processing, are available but may not be suitable for many modern applications in IoT that use edge computing, such as healthcare systems and many other critical and time-sensitive applications. E. Security Security is one of the core requirements of all modern systems. The use of edge computing in IoT is subject to developing secure systems and applica- tions. The security requirement is almost undefined in cloud computing; therefore, cloud services are vulnerable to certain types of attacks. Cloud com- puting services are easy targets of security threats and data breaches because of their specific structure. However, in edge computing, security should be well defined and clearly implemented. Therefore, improved data security can be provided because client data are aggregated at certain access points placed closed to the end user. F. Interoperability Interoperability is a key requirement in infor- mation technology and telecommunication. Appli- cations and services developed for IoT-based edge computing must be interoperable to ensure compati- bility with other applications and hardware compo- nents. Several of the key requirements above are mentioned in the perspective of IoT. This set of requirements is not a full and complete list. Other requirements may be applied in different applica- tions. IV. ROLE OF EDGE COMPUTING IN THE INTERNET OF THINGS Edge computing is expected act as a strategic brain behind IoT. Identifying the role of edge com- puting in IoT is the main research issue at present. Edge computing is utilized to reduce the amount of data sent to the cloud and decrease service access latency. Figure 3 illustrates the complimen- tary role of edge and cloud computing in the IoT environment. In this section, several major roles of edge computing are discussed with IoT scenario examples. A. Data Acquisition Edge devices, including sensors or machines, can capture streaming data for rapid analysis and perform immediate actions or processing of the data. According to Beckman, we are moving the algorithm to the data, not the data to the algorithm. Consequently, we can increase productivity and prevent product defects efficiently and rapidly. In a smart transportation scenario, traffic light cameras can not only capture data but also analyze the collected data and make immediate decisions on their own to improve the flow of vehicles. B. Inferential Controls Inferential controls are key components of any edge device. They refer to the capacity of a device to interpret things in its environment accurately. These controls also communicate with an infrastructure that is controlled by other entities. However, bring- ing inferential capability to edge devices is difficult because it depends on contextual information. In a smart transportation scenario, this inference ability can provide drivers with highly intelligent naviga- tion instructions by using GPS and front and back cameras. C. Data Analysis Edge computing enables real-time data analysis. Analyzing data in the place of data generation can reduce the latency of information generation from the collected data. Therefore, edge devices can collect and analyze data from surrounding devices, thus allowing decision makers to deliver actionable insights faster than before. Edge devices can also help reduce network bandwidth and cost because
  • 7. IEEE COMMUNICATIONS MAGAZINE 7 Smart Cars Offices Factories Human Smart Gadgets Thermal Power Cloud Edge Server Edge Server Edge Server Edge Server Edge Server Fig. 3: Illustration of Edge Cloud Computing Complimentary Role in IoT Environment data will be locally analyzed. This can be helpful for many organizations in many industries, including manufacturing, healthcare, telecommunication, and finance, such that the need for the IoT concept increases. Therefore, instead of traffic light cameras sending data to a central infrastructure for data anal- ysis, they can analyze streaming data themselves, communicate with other devices, and make imme- diate decisions to accomplish the required tasks. D. Decision Making After locally analyzing the data, the next step for edge devices is to make critical strategic decisions. In a smart transportation system, each car generates a large amount of data every second and requires real-time processing and correct decisions. For real- time processing, the data cannot be sent to the cloud for processing and decision making because the response time would be too long in this case. In such a case, the data should be analyzed locally on any edge device. In this manner, the car can make a correct decision on the spot to avoid adverse situations. E. Enhanced Data Security When data are sent abroad for data processing, data insecurity is increased. Data collection and analysis are performed locally in edge computing. Extensive routing is not involved, such that identi- fying any suspicious activity is easy. Implementing necessary actions before any security breach occurs also becomes easy. V. OPEN RESEARCH CHALLENGES The following discussion highlights the open re- search challenges in the deployment of edge cloud in the IoT environment. A. Heterogeneity Heterogeneity in the IoT-based edge computing environment exists in computing and communica- tion technologies. Computing platforms can have different operating systems and hardware architec- tures, whereas communication technologies can be heterogeneous with regard to data rate, transmission range, and bandwidth. One of the challenges in edge computing is to develop a solution in software space that is portable across different environments. This
  • 8. IEEE COMMUNICATIONS MAGAZINE 8 challenge is crucial because various applications are deployed in edge devices. Several researchers have proposed software solutions to resolve this issue, but all of these solutions are hardware spe- cific. Thus, they cannot resolve the problem in heterogeneous environments. To solve this issue, programmers should develop a programming model for edge nodes that is supported by task- and data- level parallelism to facilitate the execution of work- loads simultaneously at multiple hardware levels. The second consideration is to use a language that supports hardware heterogeneity. B. Standard Protocols and Interfaces Edge computing is an emerging technology in the IoT field. In this heterogeneous environment, different devices and sensors connect and commu- nicate with one another and with the edge server via communication protocols. These devices have their own interfaces and thus demand specific communi- cation protocols. Considering that different vendors manufacture different devices in the IoT environ- ment, standard protocols and interfaces should be developed to enable communication among these heterogeneous devices. The development of stan- dard protocols and interfaces in the IoT environment is challenging because of the rapid development of new devices. C. Availability Availability in the IoT-based edge computing environment includes hardware- and software-level provision of resources and services anywhere and anytime for subscribed IoT devices. Usually, avail- ability comprises three factors, namely, mean time between failure, failure probability, and mean time to recovery. Ensuring the availability of resources and services for the growing number of IoT devices is a challenging research perspective. However, availability can be optimized by maximizing the mean time between failures and minimizing the failure probability and mean time to recovery. D. Data Abstraction With IoT, a number of data-generating devices are connected in the network, and all of these data generators report tremendously large raw data to the edge device. For the edge device, analyzing such big data is computationally difficult. Security risks are also involved. Therefore, the data should be pre- processed at the gateway level, such as noise/low- quality removal, event detection, and privacy protec- tion. The processed data will be sent to the upper layer for future service provision. However, many challenges may occur in this process. For privacy and security purposes, applications running on edge devices should be blind to these raw data. Therefore, the details of the data should be removed during data preprocessing. However, the usability of the data can be affected by hiding the details of sensed data. Defining the extent to which the raw data should be filtered out is also a challenge because several applications cannot obtain accurate results from such data. E. Security and Privacy Edge computing acts as a boon to cybersecurity because data do not travel over a network. However, a highly dynamic environment at the edge of a network makes the network unprotected. Given that different devices are connected in IoT, a large array of potential security threats can be generated. Many applications are running at the network edge, so the data provided to these applications should be in a hidden form. Otherwise, any intruder can use the open data for illegal purposes. For example, if a home is connected to IoT, then private data, such as individual health data, can be stolen. In this case, how to support the service without harming privacy is a challenge. Applications running on edge devices should be blind to the raw data. Personal data can be removed before reaching the edge device. Several solutions have been provided by researchers to standardize and store health data [13]. X. Sun et al. [14] proposed a hierarchical fog computing framework called EdgeIoT. This framework uses a proxy virtual machine for securing the privacy of user content and reducing data traffic in the core network. However, security features with enhanced robustness should be implemented on edge nodes. VI. CONCLUSION In this article, we investigated, highlighted, and reported recent premier advances in edge comput- ing technologies (e.g., fog computing, MEC, and cloudlets) with respect to measuring their effect on IoT. Then, we categorized edge computing literature
  • 9. IEEE COMMUNICATIONS MAGAZINE 9 by devising a taxonomy, which was used to uncover the premium features of edge computing that can be beneficial to the IoT paradigm. We outlined a few key requirements for the deployment of edge com- puting in IoT and discussed indispensable scenarios of edge computing in IoT. Furthermore, several open research challenges to the successful deployment of edge computing in IoT are identified and discussed. We conclude that although the deployment of edge computing in IoT provides numerous benefits, the convergence of these two computing paradigms brings about new issues that should be resolved in the future. ACKNOWLEDGEMENTS Imran’s work is supported by the Deanship of Scientific Research at King Saud University through Research group No. (RG # 1435-051). REFERENCES [1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling tech- nologies, protocols, and applications,” IEEE Communications Surveys Tutorials, vol. 17, no. 4, pp. 2347–2376, Fourthquarter 2015. [2] M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, W. Hu, and B. Amos, “Edge analytics in the internet of things,” IEEE Pervasive Computing, vol. 14, no. 2, pp. 24–31, 2015. [3] M. Jia, J. Cao, and W. Liang, “Optimal cloudlet placement and user to cloudlet allocation in wireless metropolitan area networks,” IEEE Transactions on Cloud Computing, vol. 5, no. 4, pp. 725–737, Oct 2017. [4] S. Yi, C. Li, and Q. Li, “A survey of fog computing: concepts, applications and issues,” in Proceedings of the 2015 Workshop on Mobile Big Data. ACM, 2015, pp. 37–42. [5] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, “Mobile edge computing potential in making cities smarter,” IEEE Communications Magazine, vol. 55, no. 3, pp. 38–43, March 2017. [6] M. Satyanarayanan, “The emergence of edge computing,” Com- puter, vol. 50, no. 1, pp. 30–39, 2017. [7] E. K. Markakis, I. Politis, A. Lykourgiotis, Y. Rebahi, G. Mas- torakis, C. X. Mavromoustakis, and E. Pallis, “Efficient next generation emergency communications over multi-access edge computing,” IEEE Communications Magazine, vol. 55, no. 11, pp. 92–97, NOVEMBER 2017. [8] P. Mach and Z. Becvar, “Mobile edge computing: A survey on architecture and computation offloading,” IEEE Commu- nications Surveys Tutorials, vol. 19, no. 3, pp. 1628–1656, thirdquarter 2017. [9] E. Ahmed, A. Ahmed, I. Yaqoob, J. Shuja, A. Gani, M. Imran, and M. Shoaib, “Bringing computation closer toward the user network: Is edge computing the solution?” IEEE Communica- tions Magazine, vol. 55, no. 11, pp. 138–144, 2017. [10] X. Huang, R. Yu, J. Kang, Y. He, and Y. Zhang, “Exploring mobile edge computing for 5g-enabled software defined vehic- ular networks,” IEEE Wireless Communications, vol. 24, no. 6, pp. 55–63, Dec 2017. [11] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani, “Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges,” IEEE Wireless Com- munications, vol. 23, no. 5, pp. 10–16, 2016. [12] J. Pan and J. McElhannon, “Future edge cloud and edge computing for internet of things applications,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 439–449, Feb 2018. [13] F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma, “Fog computing in healthcare–a review and discussion,” IEEE Access, vol. 5, pp. 9206–9222, 2017. [14] X. Sun and N. Ansari, “Edgeiot: Mobile edge computing for the internet of things,” IEEE Communications Magazine, vol. 54, no. 12, pp. 22–29, 2016. PLACE PHOTO HERE Najmul Hassan was born in 1983 in Ab- bottabad, Pakistan. He did his MS in Com- puter Sciences from Mohammad Ali Jinnah University, Islamabad, Pakistan in 2010. He is currently working in collaboration with Dr. Jin Li, School of Computer Science Guangzhou University China. His research areas are In- ternet of Things, Edge/Cloud Communication, Wireless Body Area Networks and Wireless Sensor Networks. PLACE PHOTO HERE Saira Gillani received her PhD degree in Information Sciences from Corvinus Univer- sity of Budapest, Hungary in december 2015. She is currently serving as an assistant pro- fessor in Saudi Electronic University, Jed- dah, Saudi Arabia. Previously, she worked as research scholar in Corvinno, Technology Transfer Center of Information Technology and Services in Budapest, Hungary. Her areas of interest include Text Mining, Data Mining, Machine Learning, VANET, Mobile Edge Computing and Internet of Things. PLACE PHOTO HERE Ejaz Ahmed (S’13, M’17) received his Ph.D. (Computer Science) from University of Malaya, Kuala Lumpur, Malaysia in 2016. He is an associate editor of IEEE Communication Magazine, IEEE Access, KSII TIIS, Elsevier JNCA and Elsevier FGCS. His areas of interest include Big Data, Mobile Cloud Computing, Mobile Edge Computing, Internet of Things, and Cognitive Radio Networks. He has also received a number of awards during his research career.
  • 10. IEEE COMMUNICATIONS MAGAZINE 10 PLACE PHOTO HERE Ibrar Yaqoob received his Ph.D. (Com- puter Science) from the University of Malaya, Malaysia, in 2017. He has published a num- ber of research articles in refereed interna- tional journals and magazines. His numerous research articles are very famous and among the most downloaded in top journals. His re- search interests include big data, mobile cloud, the Internet of Things, cloud computing, and wireless networks. PLACE PHOTO HERE Muhammad Imran is currently working at King Saud University and visiting scien- tist with Iowa State University. His research interest includes MANET, WSNs, WBANs, M2M/IoT, SDN, Security and privacy. He has published number of research papers in ref- ereed international conferences and journals. He serves as a Co-Editor in Chief for EAI Transactions and Associate/Guest editor for IEEE (Access, Communications Magazine), Computer Networks, Sensors, IJDSN, JIT, WCMC, AHSWN, IET WSS, IJAACS and IJITEE.