<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc iprnotified="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc colonspace="yes"?>
<?rfc rfcedstyle="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-iot-edge-05" category="info" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 2.40.0 -->
  <front>
    <title abbrev="IoT Edge Computing">IoT Edge Challenges and Functions</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-iot-edge-05"/>
    <author initials="J." surname="Hong" fullname="Jungha Hong">
      <organization>ETRI</organization>
      <address>
        <postal>
          <street>218 Gajeong-ro, Yuseung-Gu</street>
          <city>Daejeon</city>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <email>jhong@etri.re.kr</email>
      </address>
    </author>
    <author initials="Y-G." surname="Hong" fullname="Yong-Geun Hong">
      <organization>Daejeon University</organization>
      <address>
        <postal>
          <street>62 Daehak-ro, Dong-gu</street>
          <city>Daejeon</city>
          <code>300716</code>
          <country>Republic of Korea</country>
        </postal>
        <email>yonggeun.hong@gmail.com</email>
      </address>
    </author>
    <author initials="X." surname="de Foy" fullname="Xavier de Foy">
      <organization>InterDigital Communications, LLC</organization>
      <address>
        <postal>
          <street>1000 Sherbrooke West</street>
          <city>Montreal</city>
          <code>H3A 3G4</code>
          <country>Canada</country>
        </postal>
        <email>xavier.defoy@interdigital.com</email>
      </address>
    </author>
    <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
      <organization>Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25 C // 3.OG</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>ietf@kovatsch.net</email>
      </address>
    </author>
    <author initials="E." surname="Schooler" fullname="Eve Schooler">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd.</street>
          <city>Santa Clara, CA</city>
          <code>95054-1537</code>
          <country>USA</country>
        </postal>
        <email>eve.m.schooler@intel.com</email>
      </address>
    </author>
    <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
      <organization>University of Applied Sciences Emden/Leer</organization>
      <address>
        <postal>
          <street>Constantiaplatz 4</street>
          <city>Emden</city>
          <code>26723</code>
          <country>Germany</country>
        </postal>
        <email>ietf@dkutscher.net</email>
      </address>
    </author>
    <date year="2022" month="May" day="22"/>
    <area>T2TRG</area>
    <abstract>
      <t>Many IoT applications have requirements that cannot be met by the traditional Cloud (aka cloud computing). These include time sensitivity, data volume, connectivity cost, operation in the face of intermittent services, privacy, and security. As a result, the IoT is driving the Internet toward Edge computing. This document outlines the requirements of the emerging IoT Edge and its challenges. It presents a general model, and major components of the IoT Edge, to provide a common base for future discussions in T2TRG and other IRTF and IETF groups.</t>
      <!--
This document is a product of the Thing-to-Thing Research Group (T2TRG)
-->



    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Currently, many IoT services leverage the Cloud, since it can provide virtually unlimited storage and processing power.
The reliance of IoT on back-end cloud computing brings additional advantages such as flexibility and efficiency.
Today's IoT systems are fairly static with respect to integrating and supporting computation.
It's not that there is no computation, but systems are often limited to static configurations (edge gateways, cloud services).</t>
      <t>However, IoT devices are creating vast amounts of data at the network edge. To meet IoT use case requirements, that data increasingly is being stored, processed, analyzed, and acted upon close to the data producers.
These requirements include time sensitivity, data volume, connectivity cost, resiliency in the face of intermittent connectivity, privacy, and security, which cannot be addressed by today's centralized cloud computing.
These requirements suggest a more flexible way to distribute computing (and storage) and to integrate it in the edge-cloud continuum.
We will refer to this integration of edge computing and IoT as "IoT edge computing".
Our draft describes related background, uses cases, challenges, system models, and functional components.</t>
      <t>Due to the dynamic nature of the IoT edge computing landscape, this document does not list existing projects in this field. However, <xref target="sec-overview" format="default"/> presents a high-level overview of the field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D-defoy-t2trg-iot-edge-computing-background" format="default"/>.</t>
      <!--
This document represents the consensus of the Thing-to-Thing Research Group (T2TRG).  It has been reviewed extensively by Research Group (RG) members with expertise in edge computing and IoT.
-->

</section>
    <section anchor="background" numbered="true" toc="default">
      <name>Background</name>
      <section anchor="internet-of-things-iot" numbered="true" toc="default">
        <name>Internet of Things (IoT)</name>
        <t>Since the term "Internet of Things" (IoT) was coined by Kevin Ashton in 1999 working on Radio-Frequency Identification (RFID) technology <xref target="Ashton" format="default"/>,
the concept of IoT has evolved. It now reflects a vision of connecting the physical world to the virtual world of computers using (wireless) networks over which things can send and receive information without human intervention.
Recently, the term has become more literal by actually connecting things to the Internet and converging on Internet and Web technology.</t>
        <t>Things are usually embedded systems of various kinds, such as home appliances, mobile equipment, wearable devices, etc.
Things are widely distributed, but typically have limited storage and processing power, which raise concerns regarding reliability, performance, energy consumption, security, and privacy  <xref target="Lin" format="default"/>.
This limited storage and processing power leads to complementing IoT with cloud computing.</t>
      </section>
      <section anchor="cloud-computing" numbered="true" toc="default">
        <name>Cloud Computing</name>
        <t>Cloud computing has been defined in <xref target="NIST" format="default"/>: "cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction".
Low cost and massive availability of storage and processing power enabled the realization of another computing model, in which virtualized resources can be leased in an on-demand fashion, being provided as general utilities.
Companies like Amazon, Google, Facebook, etc. widely adopted this paradigm for delivering services over the Internet, gaining both economical and technical benefits <xref target="Botta" format="default"/>.</t>
        <t>Today, an unprecedented volume and variety of data is generated by things, and applications deployed at the network edge consume this data.
In this context, cloud-based service models are not suitable for some classes of applications, which for example need very short response times, access to local personal data, or generate vast amounts of data.
Those applications may instead leverage edge computing.</t>
      </section>
      <section anchor="edge-computing" numbered="true" toc="default">
        <name>Edge Computing</name>
        <t>Edge computing, also referred to as fog computing in some settings, is a new paradigm in which substantial computing and storage resources are placed at the edge of the Internet, that is, close to mobile devices, sensors, actuators, or machines.
Edge computing happens near data sources <xref target="Mahadev" format="default"/>, or closer (topologically, physically, in terms of latency, etc.) to where decisions or interactions with the physical world are happening.
It processes both downstream data, e.g. originated from cloud services, and upstream data, e.g. originated from end devices or network elements.
The term fog computing usually represents the notion of a multi-tiered edge computing, that is, several layers of compute infrastructure between the end devices and cloud services.</t>
        <t>An edge device is any computing or networking resource residing between end-devices' data sources and cloud-based data centers.
In edge computing, end devices not only consume data but also produce data.
And at the network edge, devices not only request services and information from the Cloud, but also handle computing tasks including processing, storage, caching, and load balancing on data sent to and from the Cloud <xref target="Shi" format="default"/>.
This does not preclude end devices from hosting computation themselves when possible, independently or as part of a distributed edge computing platform (this is also referred to as Mist Computing).</t>
        <t>Several standards developing organization (SDO) and industry forums have provided definitions of edge and fog computing:</t>
        <ul spacing="normal">
          <li>ISO defines edge computing as a "form of distributed computing in which significant processing and data storage takes place on nodes which are at the edge of the network" <xref target="ISO_TR" format="default"/>.</li>
          <li>ETSI defines multi-access edge computing as a "system which provides an IT service environment and cloud-computing capabilities at the edge of an access network which contains one or more type of access technology, and in close proximity to its users" <xref target="ETSI_MEC_01" format="default"/>.</li>
          <li>The Industrial IoT Consortium (IIC, formerly OpenFog) defines fog computing as "a horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum" <xref target="OpenFog" format="default"/>.</li>
        </ul>
        <t>Based on these definitions, we can summarize a general philosophy of edge computing as to distribute the required functions close to users and data, while the difference to classic local systems is the usage of management and orchestration features adopted from cloud computing.</t>
        <t>Actors from various industries approach edge computing using different terms and reference models, although in practice these approaches are not incompatible and may integrate with each other:</t>
        <ul spacing="normal">
          <li>The telecommunication industry tends to use a model where edge computing services are deployed over Network Function Virtualization (NFV) infrastructure, at aggregation points or in proximity to the user equipment (e.g., gNodeBs) <xref target="ETSI_MEC_03" format="default"/>.</li>
          <li>Enterprise and campus solutions often interpret edge computing as an "edge cloud", that is, a smaller data center directly connected to the local network (often referred to as "on-premise").</li>
          <li>The automation industry defines the edge as the connection point between IT from OT (Operational Technology). Hence, here edge computing sometimes refers to applying IT solutions to OT problems such as analytics, more flexible user interfaces, or simply having more computing power than an automation controller.</li>
        </ul>
      </section>
      <section anchor="sec-uc" numbered="true" toc="default">
        <name>Examples of IoT Edge Computing Use Cases</name>
        <t>IoT edge computing can be used in home, industry, grid, healthcare, city, transportation, agriculture, and/or education scenarios.
We discuss here only a few examples of such use cases, to point out differentiating requirements.
These examples are followed with references to other use cases.</t>
        <t><strong>Smart Factory</strong></t>
        <t>As part of the 4th industrial revolution, smart factories run real-time processes based on IT technologies such as artificial intelligence and big data. In a smart factory, even a very small environmental change can lead to a situation in which production efficiency decreases or product quality problems occur. Therefore, simple but time-sensitive processing can be performed at the edge: for example, controlling temperature and humidity in the factory, or operating machines based on the real-time collection of the operational status of each machine. On the other hand, data requiring highly precise analysis, such as machine lifecycle management or accident risk prediction, can be transferred to a central data center for processing.</t>
        <t>The use of edge computing in a smart factory can reduce the cost of network and storage resources by reducing the communication load to the central data center or server. It is also possible to improve process efficiency and facility asset productivity through the real-time prediction of failures, and to reduce the cost of failure through preliminary measures. In the existing manufacturing field, production facilities are manually run according to a program entered in advance, but edge computing in a smart factory enables tailoring solutions by analyzing data at each production facility and machine level. Digital twins <xref target="Jones" format="default"/> of IoT devices have been use jointly with edge computing in industrial IoT scenarios <xref target="Chen" format="default"/>.</t>
        <t><strong>Smart Grid</strong></t>
        <t>In future smart city scenarios, the Smart Grid will be critical in ensuring highly available/efficient energy control in city-wide electricity management.
Edge computing is expected to play a significant role in those systems to improve transmission efficiency of electricity; to react and restore power after a disturbance; to reduce operation costs and reuse renewable energy effectively, since these operations involve local decision-making. In addition, edge computing can help to monitor power generation and power demand, and making local electrical energy storage decisions in the smart grid system.</t>
        <t><strong>Smart Agriculture</strong></t>
        <t>Smart agriculture integrates information and communication technology with farming technology. Intelligent farms use IoT technology to measure and analyze temperature, humidity, sunlight, carbon dioxide, soil, etc. in crop cultivation facilities. Depending on analysis results, control devices are used to set environmental parameters to an appropriate state. Remote management is also possible through mobile devices such as smartphones.</t>
        <t>In existing farms, simple systems such as management according to temperature and humidity can easily and inexpensively be implemented with IoT technology. Sensors in fields are gathering data on field and crop condition. This data is then transmitted to cloud servers, which process data and recommend actions. Usage of edge computing can reduce by a large amount data transmitted up and down the network, resulting in saving cost and bandwidth. Locally generated data can be processed at the edge, and local computing and analytics can drive local actions. With edge computing, it is also easy for farmers to select large amounts of data for processing, and data can be analyzed even in remote areas with poor access conditions. As the number of people working on farming decreases over time, increasing automation enabled by edge computing can be a driving force for future smart agriculture.</t>
        <t><strong>Smart Construction</strong></t>
        <t>Safety is critical on a construction site. Every year, many construction workers lose their lives due to falls, collisions, electric shocks, and other accidents.
Therefore, solutions have been developed in order to improve construction site safety, including real-time identification of workers, monitoring of equipment location, and predictive accident prevention. To deploy these solutions, many cameras and IoT sensors were installed on construction sites, that measure noise, vibration, gas concentration, etc. Typically, data generated from these measurements has been collected in an on-site gateway and sent to a remote cloud server for storage and analysis. Thus, an inspector can check the information stored on the cloud server to investigate an incident. However, this approach can be expensive, due to transmission costs, e.g., of video streams over an LTE connection, and due to usage fees of private cloud services such as Amazon Web Services.</t>
        <t>Using edge computing, data generated on the construction site can be processed and analyzed on an edge server located within or near the site. Only the result of this processing needs to be transferred to a cloud server, thus saving transmission costs. It is also possible to locally generate warnings to prevent accident in real-time.</t>
        <t><strong>Self-Driving Car</strong></t>
        <t>The self-driving car, with its focus on safety, is a system where edge computing has an essential role. Autonomous vehicles are equipped with high-resolution cameras, radars, laser scanners (LIDAR), sonar sensors, and GPS systems. Edge computing nodes collect and analyze vast amounts of data generated in real-time by these sensors to keep track of distances between vehicles in front, surrounding road conditions, vehicle flow, and to quickly respond to unexpected situations. For example, if the speed of the car running in front decreases, speed should be adjusted to maintain the distance between the cars, and when a roadside signal changes, a self-driving car should operate according to the new signal. If such processing is performed in a central data center, network delays or data transmission errors can lead to accidents. Applying edge computing can minimize these network delays and data transmission errors, thereby improving safety. In the shorter term we can expect edge computing nodes to be at the base station or in road-side units. However, to further reduce reaction times, some edge computing nodes should be located in the vehicle itself.</t>
        <t><strong>AR/VR</strong></t>
        <t>Augmented Reality (AR) and Virtual Reality (VR) are likely to strongly influence the Information and Communication Technology (ICT) market in the future, since they can support innovative products in most other use cases including smart factories, self-driving cars, etc. In AR/VR, due to large amounts of data generated at endpoints such as mobile devices and PCs, user immersion can be significantly decreased by a latency of only a few hundred milliseconds. Therefore, using an edge computing infrastructure built close to endpoints can not only reduce the cost and latency of data transmission but also maximize user immersion. For example, in AR using edge computing, streaming video can be displayed realistically in higher quality, giving users the best possible experience.</t>
        <t><strong>Other Use Cases</strong></t>
        <t>Additionally, oneM2M recently studied several use cases related to edge computing, including: smart factories, smart transportation, an accident notification service, a high-precision road map service, a vulnerable road user service and a vehicular data service. These use cases are documented in <xref target="oneM2M-TR0001" format="default"/>, <xref target="oneM2M-TR0018" format="default"/> and <xref target="oneM2M-TR0026" format="default"/>. Edge computing related requirements raised through the analysis of these use cases are captured in <xref target="oneM2M-TS0002" format="default"/>.</t>
      </section>
    </section>
    <section anchor="sec-challenges" numbered="true" toc="default">
      <name>IoT Challenges Leading Towards Edge Computing</name>
      <t>This section describes challenges met by IoT, that are motivating the adoption of edge computing for IoT. Those are distinct from research challenges applicable to IoT edge computing, some of which will be mentioned in <xref target="sec-components" format="default"/>.</t>
      <t>IoT technology is used with more and more demanding applications, e.g. in industrial, automotive or healthcare domains, leading to new challenges.
For example, industrial machines such as laser cutters already produce over 1 terabyte per hour, and similar amounts can be generated in autonomous cars <xref target="NVIDIA" format="default"/>.
90% of IoT data is expected to be stored, processed, analyzed, and acted upon close to the source <xref target="Kelly" format="default"/>, as cloud computing models alone cannot address the new challenges <xref target="Chiang" format="default"/>.</t>
      <t>Below we discuss IoT use case requirements that are moving cloud capabilities to be more proximate and more distributed and disaggregated.</t>
      <section anchor="time-sensitivity" numbered="true" toc="default">
        <name>Time Sensitivity</name>
        <t>Many industrial control systems, such as manufacturing systems, smart grids, oil and gas systems, etc., often require stringent end-to-end latency between the sensor and control node.
While some IoT applications may require latency below a few tens of milliseconds <xref target="Weiner" format="default"/>,
industrial robots and motion control systems have use cases for cycle times in the order of microseconds <xref target="_60802" format="default"/>.
In some cases speed-of-light limitations may simply prevent a solution based on remote cloud, however it is not the only challenge relative to time sensitivity.
Guarantees for jitter are also important to those industrial IoT applications.
This means control packets need to arrive with as little variation as possible and within a strict deadline.
Given the best-effort characteristics of the Internet, this challenge is virtually impossible to address, without using end-to-end guarantees for individual message delivery and continuous data flows.</t>
      </section>
      <section anchor="connectivity-cost" numbered="true" toc="default">
        <name>Connectivity Cost</name>
        <t>Some IoT deployments are not challenged by a constrained network bandwidth to the Cloud.
The fifth generation mobile networks (5G) and Wi-Fi 6 both theoretically top out at 10 gigabits per second (i.e., 4.5 terabytes per hour), which enables high-bandwidth uplinks.
However, the resulting cost for high-bandwidth connectivity to upload all data to the Cloud is unjustifiable and impractical for most IoT applications.
In some settings, e.g. in aeronautical communication, higher communication costs reduce the amount of data that can be practically uploaded even further.</t>
      </section>
      <section anchor="resilience-to-intermittent-services" numbered="true" toc="default">
        <name>Resilience to Intermittent Services</name>
        <t>Many IoT devices such as sensors, data collectors, actuators, controllers, etc. have very limited hardware resources
and cannot rely solely on their limited resources to meet all their computing and/or storage needs.
They require reliable, uninterrupted, or resilient services to augment their capabilities in order to fulfill their application tasks.
This is hard and partly impossible to achieve with cloud services for systems such as vehicles, drones, or oil rigs that have intermittent network connectivity.
The dual is also true, a cloud back-end might want to have a reading of the device even if it's currently asleep.</t>
      </section>
      <section anchor="sec-priv" numbered="true" toc="default">
        <name>Privacy and Security</name>
        <t>When IoT services are deployed at home, personal information can be learned from detected usage data.
For example, one can extract information about employment, family status, age, and income by analyzing smart meter data <xref target="ENERGY" format="default"/>.
Policy-makers started to provide frameworks that limit the usage of personal data and put strict requirements on data controllers and processors.
However, data stored indefinitely in the Cloud also increases the risk of data leakage, for instance, through attacks on rich targets.</t>
        <t>Industrial systems are often argued to not have privacy implications, as no personal data is gathered.
Yet data from such systems is often highly sensitive, as one might be able to infer trade secrets such as the setup of production lines.
Hence, the owners of these systems are generally reluctant to upload IoT data to the Cloud.</t>
        <t>Furthermore, passive observers can perform traffic analysis on the device-to-cloud path.
Hiding traffic patterns associated with sensor networks can therefore be another requirement for edge computing.</t>
      </section>
    </section>
    <section anchor="iot-edge-computing-functions" numbered="true" toc="default">
      <name>IoT Edge Computing Functions</name>
      <t>In this section, we first look at the current state of IoT edge computing <xref target="sec-overview" format="default"/>, and then define a general system model <xref target="sec-model" format="default"/>. This provides context for IoT edge computing functions, which are listed in <xref target="sec-components" format="default"/>.</t>
      <section anchor="sec-overview" numbered="true" toc="default">
        <name>Overview of IoT Edge Computing Today</name>
        <t>This section provides an overview of today's IoT edge computing field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D-defoy-t2trg-iot-edge-computing-background" format="default"/>.</t>
        <t>IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) and proprietary (such as Amazon Greengrass, Microsoft Azure IoT Edge, Google Cloud IoT Core, and gateways from Bosh, Siemens), represent a common class of IoT edge computing products, where the gateway is providing a local service on customer premises and is remotely managed through a cloud service. IoT communication protocols are typically used between IoT devices and the gateway, including CoAP, MQTT, and many specialized IoT protocols (such as OPC UA and DDS in the Industrial IoT space), while the gateway communicates with the distant cloud typically using HTTPS. Virtualization platforms enable the deployment of virtual edge computing functions (using VMs, application containers, etc.), including IoT gateway software, on servers in the mobile network infrastructure (at base stations and concentration points), in edge data centers (in central offices) or regional data centers located near central offices. End devices are envisioned to become computing devices in forward-looking projects, but they are not commonly used as such today.</t>
        <t>Besides open-source and proprietary solutions, a horizontal IoT service layer is standardized by the oneM2M standards body, to reduce fragmentation, increase interoperability and promote reuse in the IoT ecosystem.</t>
        <t>Physical or virtual IoT gateways can host application programs, which are typically built using an SDK to access local services through a programmatic API.
Edge cloud system operators host their customers' applications VMs or containers on servers located in or near access networks, which can implement local edge services. For example, mobile networks can provide edge services for radio network information, location, and bandwidth management.</t>
        <t>Life cycle management of services and applications on physical IoT gateways is often cloud-based.
Edge cloud management platforms and products (such as StarlingX, Akraino Edge Stack, Mobile EdgeX) adapt cloud management technologies (e.g., Kubernetes) to the edge cloud, i.e., to smaller, distributed computing devices running outside a controlled data center. Services and application life-cycle is typically using an NFV-like management and orchestration model.</t>
        <t>Resilience in IoT often entails the ability to operate autonomously in periods of disconnectedness in order to preserve the integrity and safety of the controlled system, possibly in a degraded mode. IoT devices and gateways are often expected to operate in the always-on and unattended mode, using fault detection and unassisted recovery functions.</t>
        <t>The platform typically includes services to advertise or consume APIs (e.g., Mp1 interface in ETSI MEC supports service discovery and communication), and enables communicating with local and remote endpoints (e.g., message routing function in IoT gateways). The service platform is typically extensible by edge applications, since they can advertise an API that other edge applications can consume. IoT communication services include protocols translation, analytics, and transcoding. Communication between edge computing devices is enabled in tiered deployments or distributed deployments.</t>
        <t>An edge cloud platform may enable pass-through without storage or local storage (e.g., on IoT gateways). Some edge cloud platforms use a distributed form of storage such as an ICN network, e.g., Named Function Networking (NFN) nodes can store data in a Named Data Networking (NDN) system, or a distributed storage platform (e.g., IPFS, EdgeFS, Ceph). External storage, e.g., on databases in distant or local IT cloud, is typically used for filtered data deemed worthy of long-term storage, although in some cases it may be for all data, for example when required for regulatory reasons.</t>
        <t>Stateful computing is supported on platforms hosting native programs, VMs or containers. Stateless computing is supported on platforms providing a "serverless computing" service (a.k.a. function-as-a-service, e.g., using stateless containers), or on systems based on named function networking.</t>
        <t>In many IoT use cases, a typical network usage pattern is high volume uplink with some form of traffic reduction enabled by processing over edge computing devices. Alternatives to traffic reduction include deferred transmission (to off-peak hours or using physical shipping). Downlink traffic includes application control and software updates. Other, downlink-heavy traffic patterns are not excluded but are more often associated with non-IoT usage (e.g., video CDNs).</t>
      </section>
      <section anchor="sec-model" numbered="true" toc="default">
        <name>General Model</name>
        <t>Edge computing is expected to play an important role in deploying new IoT services integrated with Big Data and AI, enabled by flexible in-network computing platforms. Although there are lots of approaches to edge computing, we attempt to lay out a general model and list associated logical functions in this section. In practice, this model can map to different architectures, such as:</t>
        <ul spacing="normal">
          <li>A single IoT gateway, or a hierarchy of IoT gateways, typically connected to the cloud (e.g., to extend the traditional cloud-based management of IoT devices and data to the edge). A common role of an IoT Gateway is to provide access to a heterogeneous set of IoT devices/sensors; handle IoT data; and deliver IoT data to its final destination in a cloud network. Whereas an IoT gateway needs  interactions with the cloud, it can also operate independently in a disconnected mode.</li>
          <li>A set of distributed computing nodes, e.g., embedded in switches, routers, edge cloud servers, or mobile devices. Some IoT end devices can have enough computing capabilities to participate in such distributed systems due to advances in hardware technology. In this model, edge computing nodes can collaborate to share their resources.</li>
        </ul>
        <t>In the general model described in <xref target="rl-fig1" format="default"/>, the edge computing domain is interconnected with IoT end devices (southbound connectivity) and possibly with a remote/cloud network (northbound connectivity), and with a service operator's system.
Edge computing nodes provide multiple logical functions, or components, which may not all be present in a given system. They may be implemented in a centralized or distributed fashion, at the network edge, or through some interworking between edge network and remote cloud network.</t>
        <figure anchor="rl-fig1">
          <name>Model of IoT Edge Computing</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
   +---------------------+
   |   Remote network    |  +---------------+
   |(e.g., cloud network)|  |   Service     |
   +-----------+---------+  |   Operator    |
               |            +------+--------+
               |                   |
+--------------+-------------------+-----------+
|            Edge Computing Domain             |
|                                              |
|   One or more Computing Nodes                |
|   (IoT gateway, end devices, switches,       |
|   routers, mini/micro-data centers, etc.)    |
|                                              |
|   OAM Components                             |
|   - Resource Discovery and Authentication    |
|   - Edge Organization and Federation         |
|   - Multi-Tenancy and Isolation              |
|   - ...                                      |
|                                              |
|   Functional Components                      |
|   - In-Network Computation                   |
|   - Edge Caching                             |
|   - North/South-bound Communication          |
|   - Communication Brokering                  |
|   - Other Services                           |
|   - ...                                      |
|                                              |
|   Application Components                     |
|   - IoT End Devices Management               |
|   - Data Management and Analytics            |
|   - ...                                      |
|                                              |
+------+--------------+-------- - - - -+- - - -+
       |              |       |        |       |
       |              |          +-----+--+
  +----+---+    +-----+--+    |  |compute |    |
  |  End   |    |  End   | ...   |node/end|
  |Device 1|    |Device 2| ...|  |device n|    |
  +--------+    +--------+       +--------+
                              + - - - - - - - -+
]]></artwork>
        </figure>
        <t>In the distributed model described in <xref target="rl-fig2" format="default"/>, the edge computing domain is composed of IoT edge gateways and IoT end devices which are also used as computing nodes.
Edge computing domains are connected with a remote/cloud network, and with their respective service operator's system.
IoT end devices/computing nodes provide logical functions, as part of a distributed machine learning application. The processing capabilities in IoT end devices being limited, they require the support of other nodes: the training process for AI services is executed at IoT edge gateways or cloud networks and the prediction (inference) service is executed in the IoT end devices.</t>
        <figure anchor="rl-fig2">
          <name>Example: Machine Learning over a Distributed IoT Edge Computing System</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------------------------------------------+
|            Edge Computing Domain             |
|                                              |
| +--------+    +--------+        +--------+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device m|   |
| +----+---+    +----+---+        +----+---+   |
|      |             |                 |       |
|  +---+-------------+-----------------+--+    |
|  |           IoT Edge Gateway           |    |
|  +-----------+-------------------+------+    |
|              |                   |           |
+--------------+-------------------+-----------+
               |                   |
   +-----------+---------+  +------+-------+
   |   Remote network    |  |   Service    |
   |(e.g., cloud network)|  |  Operator(s) |
   +-----------+---------+  +------+-------+
               |                   |
+--------------+-------------------+-----------+
|              |                   |           |
|  +-----------+-------------------+------+    |
|  |           IoT Edge Gateway           |    |
|  +---+-------------+-----------------+--+    |
|      |             |                 |       |
| +----+---+    +----+---+        +----+---+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device n|   |
| +--------+    +--------+        +--------+   |
|                                              |
|            Edge Computing Domain             |
+----------------------------------------------+
]]></artwork>
        </figure>
        <t>We now attempt to enumerate major edge computing domain components. They are here loosely organized into OAM (Operations, Administration, and Maintenance), functional and application components, with the understanding that the distinction between these classes may not always be clear, depending on actual system architectures. Some representative research challenges are associated with those functions. We used input from co-authors, IRTF attendees, and some comprehensive reviews of the field (<xref target="Yousefpour" format="default"/>, <xref target="Zhang2" format="default"/>, <xref target="Khan" format="default"/>).</t>
      </section>
      <section anchor="sec-components" numbered="true" toc="default">
        <name>OAM Components</name>
        <t>Edge computing OAM goes beyond the network-related OAM functions listed in <xref target="RFC6291" format="default"/>. Besides infrastructure (network, storage, and computing resources), edge computing systems can also include computing environments (for VMs, software containers, functions), IoT end devices, data, and code.</t>
        <t>Operation-related functions include performance monitoring for service level agreement measurement; fault management and provisioning for links, nodes, compute and storage resources, platforms, and services. Administration covers network/compute/storage resources, platforms and services discovery, configuration, and planning. Discovery during normal operation (e.g., discovery of compute nodes by endpoints) would typically not be included in OAM, however in this document we will not address it separately. Management covers monitoring and diagnostics of failures, as well as means to minimize their occurrence and take corrective actions. This may include software updates management, high service availability through redundancy and multipath communication. Centralized (e.g., SDN) and decentralized management systems can be used. Finally, we arbitrarily chose to address data management as an application component, however, in some systems, data management may be considered to be similar to a network management function.</t>
        <t>We further detail a few OAM components.</t>
        <section anchor="sec-dis-auth" numbered="true" toc="default">
          <name>Resource Discovery and Authentication</name>
          <t>Discovery and authentication may target platforms, infrastructure resources, such as compute, network and storage, but also other resources such as IoT end devices, sensors, data, code units, services, applications, or users interacting with the system. Broker-based solutions can be used, e.g., using an IoT gateway as a broker to discover IoT resources. More decentralized solutions can also be used in replacement or complement, e.g., CoAP enables multicast discovery of an IoT device, and CoAP service discovery enables obtaining a list of resources made available by this device <xref target="RFC7252" format="default"/>. Today, centralized gateway-based systems rely, for device authentication, on the installation of a secret on IoT end devices and computing devices (e.g., a device certificate stored in a hardware security module, or a combination of code and data stored in a trusted execution environment).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Discovery, authentication, and trust establishment between end devices, compute nodes, and platforms, with regard to concerns such as mobility, heterogeneous devices and networks, scale, multiple trust domains, constrained devices, anonymity, and traceability</li>
            <li>Intermittent connectivity to the Internet, preventing relying on a third-party authority <xref target="Echeverria" format="default"/></li>
            <li>Resiliency to failures <xref target="Harchol" format="default"/>, denial of service attacks, easier physical access for attackers</li>
          </ul>
        </section>
        <section anchor="edge-organization-and-federation" numbered="true" toc="default">
          <name>Edge Organization and Federation</name>
          <t>In a distributed system context, once edge devices have discovered and authenticated each other, they can be organized, or self-organize, into hierarchies or clusters. The organization structure may range from centralized to peer-to-peer, or it may be closely tied with other systems. Such groups can also form federations with other edge or remote clouds.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Support for scaling, and enabling fault-tolerance or self-healing <xref target="Jeong" format="default"/>. Besides using hierarchical organization to cope with scaling, another available and possibly complementary mechanism is multicast (<xref target="RFC7390" format="default"/> <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>)</li>
            <li>Integration of edge computing with virtualized Radio Access Networks (Fog RAN) <xref target="I-D.bernardos-sfc-fog-ran" format="default"/> and with 5G access networks</li>
            <li>Sharing resources in multi-vendor/operator scenarios, to optimize criteria such as profit <xref target="Anglano" format="default"/>, resource usage, latency, or energy consumption</li>
            <li>Capacity planning, placement of infrastructure nodes to minimize delay <xref target="Fan" format="default"/>, cost, energy, etc.</li>
            <li>Incentives for participation, e.g. in peer-to-peer federation schemes</li>
          </ul>
        </section>
        <section anchor="multi-tenancy-and-isolation" numbered="true" toc="default">
          <name>Multi-Tenancy and Isolation</name>
          <t>Some IoT edge computing systems make use of virtualized (compute, storage and networking) resources to address the need for secure multi-tenancy at the edge. This leads to "edge clouds" that share properties with the remote Cloud and can reuse some of its ecosystem. Virtualization function management is covered to a large extent by ETSI NFV and MEC standards activities. Projects such as <xref target="LFEDGE-EVE" format="default"/> further cover virtualization and its management into distributed edge computing settings.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Adapting cloud management platforms to the edge, to account for its distributed nature, e.g., using Conflict-free Replicated Data Types (CRDT) <xref target="Jeffery" format="default"/>, heterogeneity and customization, e.g., using intent-based management mechanisms <xref target="Cao" format="default"/>, and limited resources.</li>
            <li>Minimizing virtual function instantiation time and resource usage</li>
          </ul>
        </section>
      </section>
      <section anchor="functional-components" numbered="true" toc="default">
        <name>Functional Components</name>
        <section anchor="in-network-computation" numbered="true" toc="default">
          <name>In-Network Computation</name>
          <t>A core function of IoT edge computing is to enable local computation on a node at the network edge, e.g. processing input data from sensors, making local decisions, preprocessing data, offloading computation on behalf of a device, service, or user. Related functions include orchestrating computation (in a centralized or distributed manner) and managing applications lifecycle. Support for in-network computation may vary in terms of capability, e.g., computing nodes can host virtual machines, software containers, software actors or unikernels able to run stateful or stateless code, or a rules engine providing an API to register actions in response to conditions such as IoT device ID, sensor values to check, thresholds, etc.</t>
          <t>Edge offloading include offloading to and from an IoT device, and to and from a network node. <xref target="Cloudlets" format="default"/> offer an example of offloading from an end device to a network node. On the other side, oneM2M is an example of a system that allows a cloud-based IoT platform to transfer resources and tasks to a target edge node <xref target="oneM2M-TR0052" format="default"/>. Once transferred, the edge node can directly support IoT devices it serves with the service offloaded by the cloud (e.g. group management, location management, etc.)</t>
          <t>QoS can be provided in some systems through the combination of network QoS (e.g., traffic engineering or wireless resource scheduling) and compute/storage resource allocations. For example, in some systems, a bandwidth manager service can be exposed to enable allocation of bandwidth to/from an edge computing application instance.</t>
          <t>In-network computation may leverage underlying services, provided using data generated by IoT devices and access networks. Such services include end device location, radio network information, bandwidth management and congestion management (e.g., by the congestion management feature of oneM2M <xref target="oneM2M-TR0052" format="default"/>).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>(Computation placement) Selecting, in a centralized or distributed/peer-to-peer manner, an appropriate compute device based on available resources, location of data input and data sinks, compute node properties, etc., and with varying goals including for example end-to-end latency, privacy, high availability, energy conservation, or network efficiency, e.g. using load balancing techniques to avoid congestion</li>
            <li>Onboarding code on a platform or computing device, and invoking remote code execution, possibly as part of a distributed programming model and with respect to similar concerns of latency, privacy, etc. These operations should deal with heterogeneous compute nodes <xref target="Schafer" format="default"/>, and may in some cases also support end devices, including IoT devices, as compute nodes <xref target="Larrea" format="default"/></li>
            <li>Adapting Quality of Results (QoR) for applications where a perfect result is not necessary <xref target="Li" format="default"/></li>
            <li>Assisted or automatic partitioning of code <xref target="I-D.sarathchandra-coin-appcentres" format="default"/></li>
            <li>Supporting computation across trust domains, e.g. verifying computation results</li>
            <li>Support for computation mobility: relocating an instance from one compute node to another, while maintaining a given service level. Session continuity when communicating with end devices that are mobile, possibly at high speed (e.g. in vehicular scenarios). Defining lightweight execution environments for secure code mobility, e.g., using WebAssembly <xref target="Nieke" format="default"/></li>
            <li>Defining, managing, and verifying Service Level Agreements (SLA) for edge computing systems. Pricing is a related challenge</li>
          </ul>
        </section>
        <section anchor="edge-storage-and-caching" numbered="true" toc="default">
          <name>Edge Storage and Caching</name>
          <t>Local storage or caching enable local data processing (e.g., pre-processing or analysis), as well as delayed data transfer to the cloud or delayed physical shipping.
An edge node may offer local data storage (where persistence is subject to retention policies), caching, or both.
Caching generally refers to temporary storage to improve performance with no persistence guarantees.
An edge caching component manages data persistence, e.g., it schedules removal of data when it is no longer needed.
Other related aspects include authenticating and encrypting data.
Edge storage and caching can take the form of a distributed storage system.</t>
          <t>Related challenges include</t>
          <ul spacing="normal">
            <li>(Cache and data placement) Using cache positioning and data placement strategies to minimize data retrieval delay <xref target="Liu" format="default"/>, energy consumption. Caches may be positioned in the access network infrastructure, or on end devices</li>
            <li>Maintaining consistency, freshness, and privacy of stored/cached data in systems that are distributed, constrained, and dynamic (e.g. due to end devices and computing nodes churn or mobility). For example, <xref target="Mortazavi" format="default"/> exploits a hierarchical storage organization. Freshness-related metrics include the age of information <xref target="Yates" format="default"/>, that captures the timeliness of information from a sender (e.g. an IoT device).</li>
          </ul>
        </section>
        <section anchor="northboundsouthbound-communication" numbered="true" toc="default">
          <name>Northbound/Southbound Communication</name>
          <t>An edge cloud may provide a northbound data plane or management plane interface to a remote network, e.g., a cloud, home or enterprise network. This interface does not exist in standalone (local-only) scenarios. To support such an interface when it exists, an edge computing component needs to expose an API, deal with authentication and authorization, support secure communication.</t>
          <t>An edge cloud may provide an API or interface to local or mobile users, for example, to provide access to services and applications, or to manage data published by local/mobile devices.</t>
          <t>Edge computing nodes communicate with IoT devices over a southbound interface, typically for data acquisition and IoT end device management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Defining edge computing abstractions, such as PaaS <xref target="Yangui" format="default"/>, suitable for users and cloud systems to interact with edge computing systems, and dealing with interoperability issues such as data models heterogeneity.</li>
          </ul>
        </section>
        <section anchor="communication-brokering" numbered="true" toc="default">
          <name>Communication Brokering</name>
          <t>A typical function of IoT edge computing is to facilitate communication with IoT end devices: for example, enable clients to register as recipients for data from devices, as well as forwarding/routing of traffic to or from IoT end devices, enabling various data discovery and redistribution patterns, e.g., north-south with clouds, east-west with other edge devices <xref target="I-D.mcbride-edge-data-discovery-overview" format="default"/>.
Another related aspect is dispatching alerts and notifications to interested consumers both inside and outside of the edge computing domain.
Protocol translation, analytics, and video transcoding may also be performed when necessary.</t>
          <t>Communication brokering may be centralized in some systems, e.g., using a hub-and-spoke message broker, or distributed like with message buses, possibly in a layered bus approach.
Distributed systems may leverage direct communication between end devices, over device-to-device links.
A broker can ensure communication reliability, traceability, and in some cases transaction management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Enabling secure and resilient communication between IoT end devices and remote cloud, e.g. through multipath support</li>
          </ul>
        </section>
      </section>
      <section anchor="application-components" numbered="true" toc="default">
        <name>Application Components</name>
        <t>IoT edge computing can host applications such as the ones mentioned in <xref target="sec-uc" format="default"/>. While describing components of individual applications is out of our scope, some of those applications share similar functions, such as IoT end device management, data management, described below.</t>
        <section anchor="iot-end-devices-management" numbered="true" toc="default">
          <name>IoT End Devices Management</name>
          <t>IoT end device management includes managing information about the IoT devices, including their sensors, how to communicate with them, etc. Edge computing addresses the scalability challenges from the massive number of IoT end devices by separating the scalability domain into edge/local networks and remote networks. For example, in the context of the oneM2M standard, the software campaign feature enables installing, deleting, activating, and deactivating software functions/services on a potentially large number of edge nodes <xref target="oneM2M-TR0052" format="default"/>. Using a dashboard or a management software, a service provider issues those requests through an IoT cloud platform supporting the software campaign functionality.</t>
          <t>Challenges listed in <xref target="sec-dis-auth" format="default"/> may be applicable to IoT end devices management as well.</t>
        </section>
        <section anchor="sec-data" numbered="true" toc="default">
          <name>Data Management and Analytics</name>
          <t>Data storage and processing at the edge is a major aspect of IoT edge computing, directly addressing high-level IoT challenges listed in <xref target="sec-challenges" format="default"/>. Data analysis such as performed in AI/ML tasks performed at the edge may benefit from specialized hardware support on computing nodes.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Addressing concerns on resource usage, security, and privacy when sharing, processing, discovering, or managing data. For example by presenting data in views composed of an aggregation of related data <xref target="Zhang" format="default"/>; protecting data communication between authenticated peers <xref target="Basudan" format="default"/>; classifying data (e.g., in terms of privacy, importance, validity, etc.); compressing and encrypting data, e.g., using homomorphic encryption to directly process encrypted data <xref target="Stanciu" format="default"/>.</li>
            <li>Other concerns on edge data discovery (e.g., streaming data, metadata, events) include siloization and lack of standard in edge environments that can be dynamic (e.g. vehicular networks) and heterogeneous <xref target="I-D.mcbride-edge-data-discovery-overview" format="default"/></li>
            <li>Data-driven programming models <xref target="Renart" format="default"/>, e.g. event-based, including handling of naming and data abstractions</li>
            <li>Addressing concerns such as limited resources, privacy, dynamic and heterogeneous environment, to deploy machine learning at the edge. For example, making machine learning more lightweight and distributed (e.g., to enable distributed inference at the edge), supporting shorter training time and simplified models, and supporting models that can be compressed for efficient communication <xref target="Murshed" format="default"/></li>
            <li>While edge computing can support IoT services independently of cloud computing, it can also be connected to cloud computing. Thus, the relationship of IoT edge computing to cloud computing, with regard to data management, is another potential challenge <xref target="ISO_TR" format="default"/></li>
          </ul>
        </section>
      </section>
      <section anchor="simulation-and-emulation-environments" numbered="true" toc="default">
        <name>Simulation and Emulation Environments</name>
        <t>IoT Edge Computing brings new challenges to simulation and emulation tools used by researchers and developers. A varied set of applications, network, and computing technologies can coexist in a distributed system, which makes modeling difficult. Scale, mobility, and resource management are additional challenges <xref target="SimulatingFog" format="default"/>.</t>
        <t>Tools include simulators, where simplified application logic runs on top of a fog network model, and emulators, where actual applications can be deployed, typically in software containers, over a cloud infrastructure (e.g. Docker, Kubernetes) itself running over a network emulating network edge conditions such as variable delays, throughput and mobility events. To gain in scale, emulated and simulated systems can be used together in hybrid federation-based approaches <xref target="PseudoDynamicTesting" format="default"/>, while to gain in realism physical devices can be interconnected with emulated systems. Examples of related work and platforms include the publicly accessible MEC sandbox work recently initiated in ETSI <xref target="ETSI_Sandbox" format="default"/>, and open source simulators and emulators (<xref target="AdvantEDGE" format="default"/> emulator and tools cited in <xref target="SimulatingFog" format="default"/>). EdgeNet <xref target="Senel" format="default"/> is a globally distributed edge cloud for Internet researchers, using nodes contributed by institutions, and based on Docker for containerization and Kubernetes for deployment and node management.</t>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Privacy and security are drivers for the adoption of edge computing for IoT (<xref target="sec-priv" format="default"/>). As discussed in <xref target="sec-dis-auth" format="default"/>, authentication and trust (between computing nodes, management nodes, end devices) can be challenging as scale, mobility, and heterogeneity increase. The sometimes disconnected nature of edge resources can prevent relying on a third-party authority. Distributed edge computing is exposed to issues with reliability and denial of service attacks. Personal or proprietary IoT data leakage is also a major threat, especially due to the distributed nature of the systems (<xref target="sec-data" format="default"/>).</t>
      <t>However, edge computing also brings solutions in the security space: maintaining privacy by computing sensitive data closer to data generators is a major use case for IoT edge computing. An edge cloud can be used to take actions based on sensitive data, or anonymizing, aggregating or compressing data prior to transmitting to a remote cloud server. Edge computing communication brokering functions can also be used to secure communication between edge and cloud networks.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-Jose Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed, JaeSeung Song and Roberto Morabito for their valuable comments and suggestions on this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.mcbride-edge-data-discovery-overview">
        <front>
          <title>Edge Data Discovery for COIN</title>
          <seriesInfo name="Internet-Draft" value="draft-mcbride-edge-data-discovery-overview-05"/>
          <author fullname="Mike McBride">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Dirk Kutscher">
            <organization>Emden University</organization>
          </author>
          <author fullname="Eve Schooler">
            <organization>Intel</organization>
          </author>
          <author fullname="Carlos J. Bernardos">
            <organization>Universidad Carlos III de Madrid</organization>
          </author>
          <author fullname="Diego R. Lopez">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Xavier de Foy">
            <organization>InterDigital Communications, LLC</organization>
          </author>
          <date day="1" month="November" year="2020"/>
          <abstract>
            <t>   This document describes the problem of distributed data discovery in
   edge computing, and in particular for computing-in-the-network
   (COIN), which may require both the marshalling of data at the outset
   of a computation and the persistence of the resultant data after the
   computation.  Although the data might originate at the network edge,
   as more and more distributed data is created, processed, and stored,
   it becomes increasingly dispersed throughout the network.  There
   needs to be a standard way to find it.  New and existing protocols
   will need to be developed to support distributed data discovery at
   the network edge and beyond.

            </t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="BCP" value="161"/>
          <author fullname="L. Andersson" initials="L." surname="Andersson">
            <organization/>
          </author>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort">
            <organization/>
          </author>
          <author fullname="R. Bonica" initials="R." surname="Bonica">
            <organization/>
          </author>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu">
            <organization/>
          </author>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield">
            <organization/>
          </author>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood.  Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM.  There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term.  This memo documents an Internet Best Current  Practice.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="Ashton">
        <front>
          <title>That Internet of Things thing</title>
          <seriesInfo name="RFID J. vol. 22, no. 7, pp. 97-114" value=""/>
          <author initials="K." surname="Ashton">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Lin">
        <front>
          <title>A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications</title>
          <seriesInfo name="IEEE Internet of Things J., vol. 4, no. 5, pp. 1125-1142" value=""/>
          <author initials="J." surname="Lin">
            <organization/>
          </author>
          <author initials="W." surname="Yu">
            <organization/>
          </author>
          <author initials="N." surname="Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Yang">
            <organization/>
          </author>
          <author initials="H." surname="Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Zhao">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="NIST">
        <front>
          <title>The NIST definition of Cloud Computing</title>
          <seriesInfo name="Natl. Inst. Stand. Technol, vol. 53, no. 6, p. 50" value=""/>
          <author initials="P." surname="Mell">
            <organization/>
          </author>
          <author initials="T." surname="Grance">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Botta">
        <front>
          <title>Integration of Cloud Computing and Internet of Things: A survey</title>
          <seriesInfo name="Future Gener. Comput. Syst., vol. 56, pp. 684-700" value=""/>
          <author initials="A." surname="Botta">
            <organization/>
          </author>
          <author initials="W." surname="Donato">
            <organization/>
          </author>
          <author initials="V." surname="Persico">
            <organization/>
          </author>
          <author initials="A." surname="Pescape">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Shi">
        <front>
          <title>Edge computing: vision and challenges</title>
          <seriesInfo name="IEEE Internet of Things J., vol. 3, no. 5, pp. 637-646" value=""/>
          <author initials="W." surname="Shi">
            <organization/>
          </author>
          <author initials="J." surname="Cao">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang">
            <organization/>
          </author>
          <author initials="Y." surname="Li">
            <organization/>
          </author>
          <author initials="L." surname="Xu">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Mahadev">
        <front>
          <title>The Emergence of Edge Computing</title>
          <seriesInfo name="Computer, vol. 50, no. 1, pp. 30-39" value=""/>
          <author initials="M." surname="Satyanarayanan">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Chiang">
        <front>
          <title>Fog and IoT: An overview of research opportunities</title>
          <seriesInfo name="IEEE Internet Things J., vol. 3, no. 6, pp. 854-864" value=""/>
          <author initials="M." surname="Chiang">
            <organization/>
          </author>
          <author initials="T." surname="Zhang">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Weiner">
        <front>
          <title>Design of a low-latency, high-reliability wireless communication system for control applications</title>
          <seriesInfo name="IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, pp. 3829-3835" value=""/>
          <author initials="M." surname="Weiner">
            <organization/>
          </author>
          <author initials="M." surname="Jorgovanovic">
            <organization/>
          </author>
          <author initials="A." surname="Sahai">
            <organization/>
          </author>
          <author initials="B." surname="Nikolie">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Kelly" target="https://campustechnology.com/articles/2015/04/15/internet-of-things-data-to-top-1-6-zettabytes-by-2020.aspx">
        <front>
          <title>Internet of Things Data to Top 1.6 Zettabytes by 2022</title>
          <author initials="R." surname="Kelly">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="ISO_TR">
        <front>
          <title>Information Technology - Cloud Computing - Edge Computing Landscape</title>
          <seriesInfo name="ISO/IEC TR 23188" value=""/>
          <author>
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="OpenFog">
        <front>
          <title>OpenFog Reference Architecture for Fog Computing</title>
          <seriesInfo name="OpenFog Consortium" value=""/>
          <author>
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="ETSI_MEC_03" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf">
        <front>
          <title>Mobile Edge Computing (MEC); Framework and Reference Architecture</title>
          <seriesInfo name="ETSI GS 003" value=""/>
          <author initials="." surname="ETSI">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="ETSI_MEC_01" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf">
        <front>
          <title>Multi-access Edge Computing (MEC); Terminology</title>
          <seriesInfo name="ETSI GS 001" value=""/>
          <author initials="." surname="ETSI">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="NVIDIA" target="https://devblogs.nvidia.com/training-self-driving-vehicles-challenge-scale/">
        <front>
          <title>Training AI for Self-Driving Vehicles: the Challenge of Scale</title>
          <seriesInfo name="NVIDIA Developer Blog" value=""/>
          <author initials="A." surname="Grzywaczewski">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="_60802" target="http://www.ieee802.org/1/files/public/docs2018/60802-industrial-use-cases-0818-v13.pdf">
        <front>
          <title>Use Cases IEC/IEEE 60802 V1.3</title>
          <seriesInfo name="IEC/IEEE 60802" value=""/>
          <author initials="." surname="IEC/IEEE">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="ENERGY">
        <front>
          <title>Revealing Household Characteristics from Smart Meter Data</title>
          <seriesInfo name="Energy, vol. 78, pp. 397-410" value=""/>
          <author initials="C." surname="Beckel">
            <organization/>
          </author>
          <author initials="L." surname="Sadamori">
            <organization/>
          </author>
          <author initials="T." surname="Staake">
            <organization/>
          </author>
          <author initials="S." surname="Santini">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="ETSI_Sandbox" target="https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=57671">
        <front>
          <title>Multi-access Edge Computing (MEC) MEC Sandbox Work Item</title>
          <seriesInfo name="Portal" value=""/>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="AdvantEDGE" target="https://github.com/InterDigitalInc/AdvantEDGE">
        <front>
          <title>Mobile Edge Emulation Platform</title>
          <seriesInfo name="Source Code Repository" value=""/>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="SimulatingFog">
        <front>
          <title>Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges</title>
          <seriesInfo name="MPDI Future Internet 2019" value=""/>
          <author initials="S." surname="Svorobej">
            <organization/>
          </author>
          <author initials="." surname="al">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="PseudoDynamicTesting">
        <front>
          <title>Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems</title>
          <seriesInfo name="IEEE Communications Magazine, Nov. 2017" value=""/>
          <author initials="M." surname="Ficco">
            <organization/>
          </author>
          <author initials="C." surname="Esposito">
            <organization/>
          </author>
          <author initials="Y." surname="Xiang">
            <organization/>
          </author>
          <author initials="F." surname="Palmieri">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="LFEDGE-EVE" target="https://www.lfedge.org/projects/eve">
        <front>
          <title>Project Edge Virtualization Engine (EVE)</title>
          <seriesInfo name="Portal" value=""/>
          <author initials="." surname="Linux Foundation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Yousefpour">
        <front>
          <title>All one needs to know about fog computing and related edge computing paradigms: A complete survey</title>
          <seriesInfo name="Journal of Systems Architecture, vol. 98, pp. 289-330" value=""/>
          <author initials="A." surname="Yousefpour">
            <organization/>
          </author>
          <author initials="C." surname="Fung">
            <organization/>
          </author>
          <author initials="T." surname="Nguyen">
            <organization/>
          </author>
          <author initials="K." surname="Kadiyala">
            <organization/>
          </author>
          <author initials="F." surname="Jalali">
            <organization/>
          </author>
          <author initials="A." surname="Niakanlahiji">
            <organization/>
          </author>
          <author initials="J." surname="Kong">
            <organization/>
          </author>
          <author initials="J.P." surname="Jue">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="I-D.bernardos-sfc-fog-ran">
        <front>
          <title>Service Function Chaining Use Cases in Fog RAN</title>
          <seriesInfo name="Internet-Draft" value="draft-bernardos-sfc-fog-ran-10"/>
          <author fullname="Carlos J. Bernardos">
            <organization>UC3M</organization>
          </author>
          <author fullname="Alain Mourad">
            <organization>InterDigital</organization>
          </author>
          <date day="22" month="October" year="2021"/>
          <abstract>
            <t>   Fog Radio Access Networks (RAN) refers to the part of the RAN that is
   virtualized at the very edge of the network, even at the end-user
   device.  Fog RAN support is considered critical for the 5G mobile
   network architectures currently being developed in various research,
   standardization and industry forums.  Since fog RAN builds on top of
   virtualization and can involve several virtual functions running on
   different virtualized resources, Service function chaining (SFC)
   support for the fog RAN will be critical.  This document describes
   the overall fog RAN approach and also gives some use cases.  Finally
   it proposes some requirements to be considered in the development of
   the SFC architecture and related protocols.

            </t>
          </abstract>
        </front>
      </reference>
      <reference anchor="Schafer">
        <front>
          <title>Tasklets: Overcoming Heterogeneity in Distributed Computing Systems</title>
          <seriesInfo name="IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Nara, pp. 156-161" value=""/>
          <author initials="D." surname="Schafer">
            <organization/>
          </author>
          <author initials="J." surname="Edinger">
            <organization/>
          </author>
          <author initials="S." surname="VanSyckel">
            <organization/>
          </author>
          <author initials="J.M." surname="Paluska">
            <organization/>
          </author>
          <author initials="C." surname="Becker">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Echeverria">
        <front>
          <title>Establishing trusted identities in disconnected edge environments</title>
          <seriesInfo name="IEEE/ACM Symposium Edge Computing (SEC), pages 51-63." value=""/>
          <author initials="S." surname="Echeverria">
            <organization/>
          </author>
          <author initials="D." surname="Klinedinst">
            <organization/>
          </author>
          <author initials="K." surname="Williams">
            <organization/>
          </author>
          <author initials="G." surname="A Lewis">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Harchol">
        <front>
          <title>Cessna: Resilient edge-computing</title>
          <seriesInfo name="Workshop on Mobile Edge Communications, pages 1-6. ACM" value=""/>
          <author initials="Y." surname="Harchol">
            <organization/>
          </author>
          <author initials="A." surname="Mushtaq">
            <organization/>
          </author>
          <author initials="J." surname="McCauley">
            <organization/>
          </author>
          <author initials="A." surname="Panda">
            <organization/>
          </author>
          <author initials="S." surname="Shenker">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Anglano">
        <front>
          <title>A game-theoretic approach to coalition formation in fog provider federations</title>
          <seriesInfo name="IEEE Third International Conference on Fog and Mobile Edge Computing (FMEC), pages 123-130" value=""/>
          <author initials="C." surname="Anglano">
            <organization/>
          </author>
          <author initials="M." surname="Canonico">
            <organization/>
          </author>
          <author initials="P." surname="Castagno">
            <organization/>
          </author>
          <author initials="M." surname="Guazzone">
            <organization/>
          </author>
          <author initials="M." surname="Sereno">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Jeong">
        <front>
          <title>Towards a distributed computing framework for fog</title>
          <seriesInfo name="IEEE Fog World Congress (FWC), pages 1-6" value=""/>
          <author initials="T." surname="Jeong">
            <organization/>
          </author>
          <author initials="J." surname="Chung">
            <organization/>
          </author>
          <author initials="J.W." surname="Hong">
            <organization/>
          </author>
          <author initials="S." surname="Ha">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Fan">
        <front>
          <title>Cost aware cloudlet placement for big data processing at the edge</title>
          <seriesInfo name="IEEE International Conference on Communications (ICC), pages 1-6" value=""/>
          <author initials="Q." surname="Fan">
            <organization/>
          </author>
          <author initials="N." surname="Ansari">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Yangui">
        <front>
          <title>A platform as-a-service for hybrid cloud/fog environments</title>
          <seriesInfo name="IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pages 1-7" value=""/>
          <author initials="S." surname="Yangui">
            <organization/>
          </author>
          <author initials="P." surname="Ravindran">
            <organization/>
          </author>
          <author initials="O." surname="Bibani">
            <organization/>
          </author>
          <author initials="R." surname="H Glitho">
            <organization/>
          </author>
          <author initials="N." surname="Ben Hadj-Alouane">
            <organization/>
          </author>
          <author initials="M.J." surname="Morrow">
            <organization/>
          </author>
          <author initials="P.A." surname="Polakos">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Li">
        <front>
          <title>Mobiqor: Pushing the envelope of mobile edge computing via quality-of-result optimization</title>
          <seriesInfo name="IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pages 1261-1270" value=""/>
          <author initials="Y." surname="Li">
            <organization/>
          </author>
          <author initials="Y." surname="Chen">
            <organization/>
          </author>
          <author initials="T." surname="Lan">
            <organization/>
          </author>
          <author initials="G." surname="Venkataramani">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Liu">
        <front>
          <title>Cache placement in fog-rans: From centralized to distributed algorithms</title>
          <seriesInfo name="IEEE Transactions on Wireless Communications, 16(11):7039-7051" value=""/>
          <author initials="J." surname="Liu">
            <organization/>
          </author>
          <author initials="B." surname="Bai">
            <organization/>
          </author>
          <author initials="J." surname="Zhang">
            <organization/>
          </author>
          <author initials="K.B." surname="Letaief">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Zhang">
        <front>
          <title>Firework: Big data sharing and processing in collaborative edge environment</title>
          <seriesInfo name="Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pages 20-25" value=""/>
          <author initials="Q." surname="Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Zhang">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Shi">
            <organization/>
          </author>
          <author initials="H." surname="Zhong">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Basudan">
        <front>
          <title>A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing</title>
          <seriesInfo name="IEEE Internet of Things Journal, 4(3):772-782" value=""/>
          <author initials="S." surname="Basudan">
            <organization/>
          </author>
          <author initials="X." surname="Lin">
            <organization/>
          </author>
          <author initials="K." surname="Sankaranarayanan">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Renart">
        <front>
          <title>Data-driven stream processing at the edge</title>
          <seriesInfo name="IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pages 31-40" value=""/>
          <author initials="E.G." surname="Renart">
            <organization/>
          </author>
          <author initials="J." surname="Diaz-Montes">
            <organization/>
          </author>
          <author initials="M." surname="Parashar">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Zhang2">
        <front>
          <title>Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues</title>
          <seriesInfo name="IEEE Access, vol. 6, pp. 18209-18237" value=""/>
          <author initials="J." surname="Zhang">
            <organization/>
          </author>
          <author initials="B." surname="Chen">
            <organization/>
          </author>
          <author initials="Y." surname="Zhao">
            <organization/>
          </author>
          <author initials="X." surname="Cheng">
            <organization/>
          </author>
          <author initials="F." surname="Hu">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Yates">
        <front>
          <title>The Age of Information: Real-Time Status Updating by Multiple Sources</title>
          <seriesInfo name="IEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1807-1827" value=""/>
          <author initials="R.D." surname="Yates">
            <organization/>
          </author>
          <author initials="S.K." surname="Kaul">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Khan">
        <front>
          <title>Edge Computing Enabled Smart Cities: A Comprehensive Survey</title>
          <seriesInfo name="arXiv:1909.08747" value=""/>
          <author initials="L.U." surname="Khan">
            <organization/>
          </author>
          <author initials="I." surname="Yaqoob">
            <organization/>
          </author>
          <author initials="N.H." surname="Tran">
            <organization/>
          </author>
          <author initials="S.M.A." surname="Kazmi">
            <organization/>
          </author>
          <author initials="T.N." surname="Dang">
            <organization/>
          </author>
          <author initials="C.S." surname="Hong">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="RFC7390">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <seriesInfo name="DOI" value="10.17487/RFC7390"/>
          <seriesInfo name="RFC" value="7390"/>
          <author fullname="A. Rahman" initials="A." role="editor" surname="Rahman">
            <organization/>
          </author>
          <author fullname="E. Dijk" initials="E." role="editor" surname="Dijk">
            <organization/>
          </author>
          <date month="October" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for constrained devices and constrained networks. It is anticipated that constrained devices will often naturally operate in groups (e.g., in a building automation scenario, all lights in a given room may need to be switched on/off as a group). This specification defines how CoAP should be used in a group communication context.  An approach for using CoAP on top of IP multicast is detailed based on existing CoAP functionality as well as new features introduced in this specification.  Also, various use cases and corresponding protocol flows are provided to illustrate important concepts.  Finally, guidance is provided for deployment in various network topologies.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-groupcomm">
        <front>
          <title>Group OSCORE - Secure Group Communication for CoAP</title>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-14"/>
          <author fullname="Marco Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Göran Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuss Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Jiye Park">
            <organization>Universitaet Duisburg-Essen</organization>
          </author>
          <date day="7" month="March" year="2022"/>
          <abstract>
            <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

            </t>
          </abstract>
        </front>
      </reference>
      <reference anchor="Murshed">
        <front>
          <title>Machine learning at the network edge: A survey</title>
          <seriesInfo name="arXiv:1908.00080" value=""/>
          <author initials="M." surname="Murshed">
            <organization/>
          </author>
          <author initials="C." surname="Murphy">
            <organization/>
          </author>
          <author initials="D." surname="Hou">
            <organization/>
          </author>
          <author initials="N." surname="Khan">
            <organization/>
          </author>
          <author initials="G." surname="Ananthanarayanan">
            <organization/>
          </author>
          <author initials="F." surname="Hussain">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="I-D.sarathchandra-coin-appcentres">
        <front>
          <title>In-Network Computing for App-Centric Micro-Services</title>
          <seriesInfo name="Internet-Draft" value="draft-sarathchandra-coin-appcentres-04"/>
          <author fullname="Dirk Trossen">
            <organization>Huawei</organization>
          </author>
          <author fullname="Chathura Sarathchandra">
            <organization>InterDigital Inc.</organization>
          </author>
          <author fullname="Michael Boniface">
            <organization>University of Southampton</organization>
          </author>
          <date day="26" month="January" year="2021"/>
          <abstract>
            <t>   The application-centric deployment of 'Internet' services has
   increased over the past ten years with many millions of applications
   providing user-centric services, executed on increasingly more
   powerful smartphones that are supported by Internet-based cloud
   services in distributed data centres, the latter mainly provided by
   large scale players such as Google, Amazon and alike. This draft
   outlines a vision for evolving those data centres towards executing
   app-centric micro-services; we dub this evolved data centre as an
   AppCentre. Complemented with the proliferation of such AppCentres at
   the edge of the network, they will allow for such micro-services to
   be distributed across many places of execution, including mobile
   terminals themselves, while specific micro-service chains equal
   today's applications in existing smartphones.

   We outline the key enabling technologies that needs to be provided
   for such evolution to be realized, including references to ongoing
   standardization efforts in key areas.


            </t>
          </abstract>
        </front>
      </reference>
      <reference anchor="I-D-defoy-t2trg-iot-edge-computing-background" target="http://www.ietf.org/internet-drafts/draft-defoy-t2trg-iot-edge-computing-background-00.txt">
        <front>
          <title>Machine learning at the network edge: A survey</title>
          <seriesInfo name="draft-defoy-t2trg-iot-edge-computing-background-00" value=""/>
          <author initials="X." surname="de Foy">
            <organization/>
          </author>
          <author initials="J." surname="Hong">
            <organization/>
          </author>
          <author initials="Y." surname="Hong">
            <organization/>
          </author>
          <author initials="M." surname="Kovatsch">
            <organization/>
          </author>
          <author initials="E." surname="Schooler">
            <organization/>
          </author>
          <author initials="D." surname="Kutscher">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Senel" target="https://dl.acm.org/doi/pdf/10.1145/3434770.3459737">
        <front>
          <title>EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud</title>
          <seriesInfo name="4th International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="B." surname="Senel">
            <organization/>
          </author>
          <author initials="M." surname="Mouchet">
            <organization/>
          </author>
          <author initials="J." surname="Cappos">
            <organization/>
          </author>
          <author initials="O." surname="Fourmaux">
            <organization/>
          </author>
          <author initials="T." surname="Friedman">
            <organization/>
          </author>
          <author initials="R." surname="McGeer">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Stanciu" target="https://dl.acm.org/doi/10.1145/3434770.3459735">
        <front>
          <title>Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption</title>
          <seriesInfo name="4th International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="V." surname="Stanciu">
            <organization/>
          </author>
          <author initials="M." surname="van Steen">
            <organization/>
          </author>
          <author initials="C." surname="Dobre">
            <organization/>
          </author>
          <author initials="A." surname="Peter">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Jeffery" target="https://dl.acm.org/doi/10.1145/3434770.3459730">
        <front>
          <title>Rearchitecting Kubernetes for the Edge</title>
          <seriesInfo name="4th International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="A." surname="Jeffery">
            <organization/>
          </author>
          <author initials="H." surname="Howard">
            <organization/>
          </author>
          <author initials="R." surname="Mortier">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Nieke" target="https://doi.org/10.1145/3434770.3459731">
        <front>
          <title>Edgedancer: Secure Mobile WebAssembly Services on the Edge</title>
          <seriesInfo name="4th International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="M." surname="Nieke">
            <organization/>
          </author>
          <author initials="L." surname="Almstedt">
            <organization/>
          </author>
          <author initials="R." surname="Kapitza">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Cao" target="https://doi.org/10.1145/3434770.3459741">
        <front>
          <title>ECaaS: A Management Framework of Edge Container as a Service for Business Workload</title>
          <seriesInfo name="4th International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="L." surname="Cao">
            <organization/>
          </author>
          <author initials="A." surname="Merican">
            <organization/>
          </author>
          <author initials="D." surname="Zad Tootaghaj">
            <organization/>
          </author>
          <author initials="F." surname="Ahmed">
            <organization/>
          </author>
          <author initials="P." surname="Sharma">
            <organization/>
          </author>
          <author initials="V." surname="Saxena">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Larrea" target="https://core.ac.uk/reader/327124532">
        <front>
          <title>The serverkernel operating system</title>
          <seriesInfo name="Third ACM International Workshop on Edge Systems, Analytics and Networking" value=""/>
          <author initials="J." surname="Larrea">
            <organization/>
          </author>
          <author initials="A." surname="Barbalace">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Mortazavi" target="https://www.usenix.org/conference/hotedge18/presentation/mortazavi">
        <front>
          <title>Toward Session Consistency for the Edge</title>
          <seriesInfo name="USENIX, Workshop on Hot Topics in Edge Computing (HotEdge 18)" value=""/>
          <author initials="S." surname="Hossein Mortazavi">
            <organization/>
          </author>
          <author initials="B." surname="Balasubramanian">
            <organization/>
          </author>
          <author initials="E." surname="de Lara">
            <organization/>
          </author>
          <author initials="S.P." surname="Narayanan">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="oneM2M-TR0001" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=28153">
        <front>
          <title>TR 0001, Use Cases Collection</title>
          <seriesInfo name="oneM2M" value=""/>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2018" month="October"/>
        </front>
      </reference>
      <reference anchor="oneM2M-TR0018" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29334">
        <front>
          <title>TR 0018, Industrial Domain Enablement</title>
          <seriesInfo name="oneM2M" value=""/>
          <author initials="C." surname="Lu">
            <organization/>
          </author>
          <author initials="M." surname="Jiang">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
      </reference>
      <reference anchor="oneM2M-TR0026" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=31410">
        <front>
          <title>TR 0026, Vehicular Domain Enablement</title>
          <seriesInfo name="oneM2M" value=""/>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <author initials="V." surname="Kueh">
            <organization/>
          </author>
          <date year="2020" month="January"/>
        </front>
      </reference>
      <reference anchor="oneM2M-TR0052" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=32633">
        <front>
          <title>TR 0052, Study on Edge and Fog Computing in oneM2M systems</title>
          <seriesInfo name="oneM2M" value=""/>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2020" month="September"/>
        </front>
      </reference>
      <reference anchor="oneM2M-TS0002" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29274">
        <front>
          <title>TS 0002, Requirements</title>
          <seriesInfo name="oneM2M" value=""/>
          <author initials="S." surname="He">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
      </reference>
      <reference anchor="Chen" target="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;arnumber=8466364">
        <front>
          <title>Edge computing in IoT-based manufacturing</title>
          <seriesInfo name="IEEE Communications Magazine" value=""/>
          <author initials="." surname="Baotong Chen">
            <organization/>
          </author>
          <author initials="." surname="Jiafu Wan">
            <organization/>
          </author>
          <author initials="." surname="Antonio Celesti">
            <organization/>
          </author>
          <author initials="." surname="Di Li">
            <organization/>
          </author>
          <author initials="." surname="Haider Abbas">
            <organization/>
          </author>
          <author initials="." surname="Qin Zhang">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Jones" target="https://www.sciencedirect.com/science/article/pii/S1755581720300110">
        <front>
          <title>Characterising the Digital Twin: A systematic literature review</title>
          <seriesInfo name="CIRP Journal of Manufacturing Science and Technology" value=""/>
          <author initials="." surname="David Jones">
            <organization/>
          </author>
          <author initials="." surname="Chris Snider">
            <organization/>
          </author>
          <author initials="." surname="Aydin Nassehi">
            <organization/>
          </author>
          <author initials="." surname="Jason Yon">
            <organization/>
          </author>
          <author initials="." surname="Ben Hicks">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
          <seriesInfo name="RFC" value="7252"/>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby">
            <organization/>
          </author>
          <author fullname="K. Hartke" initials="K." surname="Hartke">
            <organization/>
          </author>
          <author fullname="C. Bormann" initials="C." surname="Bormann">
            <organization/>
          </author>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="Cloudlets" target="https://ieeexplore.ieee.org/document/5280678">
        <front>
          <title>The Case for VM-Based Cloudlets in Mobile Computing</title>
          <seriesInfo name="IEEE Pervasive Computing" value=""/>
          <author initials="." surname="Mahadev Satyanarayanan">
            <organization/>
          </author>
          <author initials="." surname="Paramvir Bahl">
            <organization/>
          </author>
          <author initials="." surname="Ramon Caceres">
            <organization/>
          </author>
          <author initials="." surname="Nigel Davies">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
