<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 2.7.0) -->
<?rfc iprnotified="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc colonspace="yes"?>
<?rfc rfcedstyle="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-iot-edge-06" category="info" submissionType="IRTF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="IoT Edge Computing">IoT Edge Challenges and Functions</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-iot-edge-06"/>
    <author initials="J." surname="Hong" fullname="Jungha Hong">
      <organization>ETRI</organization>
      <address>
        <postal>
          <street>218 Gajeong-ro, Yuseung-Gu</street>
          <city>Daejeon</city>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <email>jhong@etri.re.kr</email>
      </address>
    </author>
    <author initials="Y.-G." surname="Hong" fullname="Yong-Geun Hong">
      <organization>Daejeon University</organization>
      <address>
        <postal>
          <street>62 Daehak-ro, Dong-gu</street>
          <city>Daejeon</city>
          <code>300716</code>
          <country>Republic of Korea</country>
        </postal>
        <email>yonggeun.hong@gmail.com</email>
      </address>
    </author>
    <author initials="X." surname="de Foy" fullname="Xavier de Foy">
      <organization>InterDigital Communications, LLC</organization>
      <address>
        <postal>
          <street>1000 Sherbrooke West</street>
          <city>Montreal</city>
          <code>H3A 3G4</code>
          <country>Canada</country>
        </postal>
        <email>xavier.defoy@interdigital.com</email>
      </address>
    </author>
    <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
      <organization>Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25 C // 3.OG</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>ietf@kovatsch.net</email>
      </address>
    </author>
    <author initials="E." surname="Schooler" fullname="Eve Schooler">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd.</street>
          <city>Santa Clara, CA</city>
          <code>95054-1537</code>
          <country>USA</country>
        </postal>
        <email>eve.m.schooler@intel.com</email>
      </address>
    </author>
    <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
      <organization>University of Applied Sciences Emden/Leer</organization>
      <address>
        <postal>
          <street>Constantiaplatz 4</street>
          <city>Emden</city>
          <code>26723</code>
          <country>Germany</country>
        </postal>
        <email>ietf@dkutscher.net</email>
      </address>
    </author>
    <date year="2022" month="May" day="25"/>
    <area>T2TRG</area>
    <abstract>
      <t>Many IoT applications have requirements that cannot be met by the traditional Cloud (aka cloud computing). These include time sensitivity, data volume, connectivity cost, operation in the face of intermittent services, privacy, and security. As a result, the IoT is driving the Internet toward Edge computing. This document outlines the requirements of the emerging IoT Edge and its challenges. It presents a general model, and major components of the IoT Edge, to provide a common base for future discussions in T2TRG and other IRTF and IETF groups.
This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Currently, many IoT services leverage the Cloud, since it can provide virtually unlimited storage and processing power.
The reliance of IoT on back-end cloud computing brings additional advantages such as flexibility and efficiency.
Today's IoT systems are fairly static with respect to integrating and supporting computation.
It's not that there is no computation, but systems are often limited to static configurations (edge gateways, cloud services).</t>
      <t>However, IoT devices are creating vast amounts of data at the network edge. To meet IoT use case requirements, that data increasingly is being stored, processed, analyzed, and acted upon close to the data producers.
These requirements include time sensitivity, data volume, connectivity cost, resiliency in the face of intermittent connectivity, privacy, and security, which cannot be addressed by today's centralized cloud computing.
These requirements suggest a more flexible way to distribute computing (and storage) and to integrate it in the edge-cloud continuum.
We will refer to this integration of edge computing and IoT as "IoT edge computing".
Our draft describes related background, uses cases, challenges, system models, and functional components.</t>
      <t>Due to the dynamic nature of the IoT edge computing landscape, this document does not list existing projects in this field. However, <xref target="sec-overview"/> presents a high-level overview of the field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background"/>.</t>
      <t>This document represents the consensus of the Thing-to-Thing Research Group (T2TRG). 
It has been reviewed extensively by the Research Group (RG) members who are actively
involved in the research and development of the technology covered by this document. 
It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="background">
      <name>Background</name>
      <section anchor="internet-of-things-iot">
        <name>Internet of Things (IoT)</name>
        <t>Since the term "Internet of Things" (IoT) was coined by Kevin Ashton in 1999 working on Radio-Frequency Identification (RFID) technology <xref target="Ashton"/>,
the concept of IoT has evolved. It now reflects a vision of connecting the physical world to the virtual world of computers using (wireless) networks over which things can send and receive information without human intervention.
Recently, the term has become more literal by actually connecting things to the Internet and converging on Internet and Web technology.</t>
        <t>Things are usually embedded systems of various kinds, such as home appliances, mobile equipment, wearable devices, etc.
Things are widely distributed, but typically have limited storage and processing power, which raise concerns regarding reliability, performance, energy consumption, security, and privacy  <xref target="Lin"/>.
This limited storage and processing power leads to complementing IoT with cloud computing.</t>
      </section>
      <section anchor="cloud-computing">
        <name>Cloud Computing</name>
        <t>Cloud computing has been defined in <xref target="NIST"/>: "cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction".
Low cost and massive availability of storage and processing power enabled the realization of another computing model, in which virtualized resources can be leased in an on-demand fashion, being provided as general utilities.
Companies like Amazon, Google, Facebook, etc. widely adopted this paradigm for delivering services over the Internet, gaining both economical and technical benefits <xref target="Botta"/>.</t>
        <t>Today, an unprecedented volume and variety of data is generated by things, and applications deployed at the network edge consume this data.
In this context, cloud-based service models are not suitable for some classes of applications, which for example need very short response times, access to local personal data, or generate vast amounts of data.
Those applications may instead leverage edge computing.</t>
      </section>
      <section anchor="edge-computing">
        <name>Edge Computing</name>
        <t>Edge computing, also referred to as fog computing in some settings, is a new paradigm in which substantial computing and storage resources are placed at the edge of the Internet, that is, close to mobile devices, sensors, actuators, or machines.
Edge computing happens near data sources <xref target="Mahadev"/>, or closer (topologically, physically, in terms of latency, etc.) to where decisions or interactions with the physical world are happening.
It processes both downstream data, e.g. originated from cloud services, and upstream data, e.g. originated from end devices or network elements.
The term fog computing usually represents the notion of a multi-tiered edge computing, that is, several layers of compute infrastructure between the end devices and cloud services.</t>
        <t>An edge device is any computing or networking resource residing between end-devices' data sources and cloud-based data centers.
In edge computing, end devices not only consume data but also produce data.
And at the network edge, devices not only request services and information from the Cloud, but also handle computing tasks including processing, storage, caching, and load balancing on data sent to and from the Cloud <xref target="Shi"/>.
This does not preclude end devices from hosting computation themselves when possible, independently or as part of a distributed edge computing platform (this is also referred to as Mist Computing).</t>
        <t>Several standards developing organization (SDO) and industry forums have provided definitions of edge and fog computing:</t>
        <ul spacing="normal">
          <li>ISO defines edge computing as a "form of distributed computing in which significant processing and data storage takes place on nodes which are at the edge of the network" <xref target="ISO_TR"/>.</li>
          <li>ETSI defines multi-access edge computing as a "system which provides an IT service environment and cloud-computing capabilities at the edge of an access network which contains one or more type of access technology, and in close proximity to its users" <xref target="ETSI_MEC_01"/>.</li>
          <li>The Industry IoT Consortium (IIC, formerly OpenFog) defines fog computing as "a horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum" <xref target="OpenFog"/>.</li>
        </ul>
        <t>Based on these definitions, we can summarize a general philosophy of edge computing as to distribute the required functions close to users and data, while the difference to classic local systems is the usage of management and orchestration features adopted from cloud computing.</t>
        <t>Actors from various industries approach edge computing using different terms and reference models, although in practice these approaches are not incompatible and may integrate with each other:</t>
        <ul spacing="normal">
          <li>The telecommunication industry tends to use a model where edge computing services are deployed over Network Function Virtualization (NFV) infrastructure, at aggregation points or in proximity to the user equipment (e.g., gNodeBs) <xref target="ETSI_MEC_03"/>.</li>
          <li>Enterprise and campus solutions often interpret edge computing as an "edge cloud", that is, a smaller data center directly connected to the local network (often referred to as "on-premise").</li>
          <li>The automation industry defines the edge as the connection point between IT from OT (Operational Technology). Hence, here edge computing sometimes refers to applying IT solutions to OT problems such as analytics, more flexible user interfaces, or simply having more computing power than an automation controller.</li>
        </ul>
      </section>
      <section anchor="sec-uc">
        <name>Examples of IoT Edge Computing Use Cases</name>
        <t>IoT edge computing can be used in home, industry, grid, healthcare, city, transportation, agriculture, and/or education scenarios.
We discuss here only a few examples of such use cases, to point out differentiating requirements.
These examples are followed with references to other use cases.</t>
        <t><strong>Smart Factory</strong></t>
        <t>As part of the 4th industrial revolution, smart factories run real-time processes based on IT technologies such as artificial intelligence and big data. In a smart factory, even a very small environmental change can lead to a situation in which production efficiency decreases or product quality problems occur. Therefore, simple but time-sensitive processing can be performed at the edge: for example, controlling temperature and humidity in the factory, or operating machines based on the real-time collection of the operational status of each machine. On the other hand, data requiring highly precise analysis, such as machine lifecycle management or accident risk prediction, can be transferred to a central data center for processing.</t>
        <t>The use of edge computing in a smart factory can reduce the cost of network and storage resources by reducing the communication load to the central data center or server. It is also possible to improve process efficiency and facility asset productivity through the real-time prediction of failures, and to reduce the cost of failure through preliminary measures. In the existing manufacturing field, production facilities are manually run according to a program entered in advance, but edge computing in a smart factory enables tailoring solutions by analyzing data at each production facility and machine level. Digital twins <xref target="Jones"/> of IoT devices have been use jointly with edge computing in industrial IoT scenarios <xref target="Chen"/>.</t>
        <t><strong>Smart Grid</strong></t>
        <t>In future smart city scenarios, the Smart Grid will be critical in ensuring highly available/efficient energy control in city-wide electricity management.
Edge computing is expected to play a significant role in those systems to improve transmission efficiency of electricity; to react and restore power after a disturbance; to reduce operation costs and reuse renewable energy effectively, since these operations involve local decision-making. In addition, edge computing can help to monitor power generation and power demand, and making local electrical energy storage decisions in the smart grid system.</t>
        <t><strong>Smart Agriculture</strong></t>
        <t>Smart agriculture integrates information and communication technology with farming technology. Intelligent farms use IoT technology to measure and analyze temperature, humidity, sunlight, carbon dioxide, soil, etc. in crop cultivation facilities. Depending on analysis results, control devices are used to set environmental parameters to an appropriate state. Remote management is also possible through mobile devices such as smartphones.</t>
        <t>In existing farms, simple systems such as management according to temperature and humidity can easily and inexpensively be implemented with IoT technology. Sensors in fields are gathering data on field and crop condition. This data is then transmitted to cloud servers, which process data and recommend actions. Usage of edge computing can reduce by a large amount data transmitted up and down the network, resulting in saving cost and bandwidth. Locally generated data can be processed at the edge, and local computing and analytics can drive local actions. With edge computing, it is also easy for farmers to select large amounts of data for processing, and data can be analyzed even in remote areas with poor access conditions. As the number of people working on farming decreases over time, increasing automation enabled by edge computing can be a driving force for future smart agriculture.</t>
        <t><strong>Smart Construction</strong></t>
        <t>Safety is critical on a construction site. Every year, many construction workers lose their lives due to falls, collisions, electric shocks, and other accidents.
Therefore, solutions have been developed in order to improve construction site safety, including real-time identification of workers, monitoring of equipment location, and predictive accident prevention. To deploy these solutions, many cameras and IoT sensors were installed on construction sites, that measure noise, vibration, gas concentration, etc. Typically, data generated from these measurements has been collected in an on-site gateway and sent to a remote cloud server for storage and analysis. Thus, an inspector can check the information stored on the cloud server to investigate an incident. However, this approach can be expensive, due to transmission costs, e.g., of video streams over an LTE connection, and due to usage fees of private cloud services such as Amazon Web Services.</t>
        <t>Using edge computing, data generated on the construction site can be processed and analyzed on an edge server located within or near the site. Only the result of this processing needs to be transferred to a cloud server, thus saving transmission costs. It is also possible to locally generate warnings to prevent accident in real-time.</t>
        <t><strong>Self-Driving Car</strong></t>
        <t>The self-driving car, with its focus on safety, is a system where edge computing has an essential role. Autonomous vehicles are equipped with high-resolution cameras, radars, laser scanners (LIDAR), sonar sensors, and GPS systems. Edge computing nodes collect and analyze vast amounts of data generated in real-time by these sensors to keep track of distances between vehicles in front, surrounding road conditions, vehicle flow, and to quickly respond to unexpected situations. For example, if the speed of the car running in front decreases, speed should be adjusted to maintain the distance between the cars, and when a roadside signal changes, a self-driving car should operate according to the new signal. If such processing is performed in a central data center, network delays or data transmission errors can lead to accidents. Applying edge computing can minimize these network delays and data transmission errors, thereby improving safety. In the shorter term we can expect edge computing nodes to be at the base station or in road-side units. However, to further reduce reaction times, some edge computing nodes should be located in the vehicle itself.</t>
        <t><strong>AR/VR</strong></t>
        <t>Augmented Reality (AR) and Virtual Reality (VR) are likely to strongly influence the Information and Communication Technology (ICT) market in the future, since they can support innovative products in most other use cases including smart factories, self-driving cars, etc. In AR/VR, due to large amounts of data generated at endpoints such as mobile devices and PCs, user immersion can be significantly decreased by a latency of only a few hundred milliseconds. Therefore, using an edge computing infrastructure built close to endpoints can not only reduce the cost and latency of data transmission but also maximize user immersion. For example, in AR using edge computing, streaming video can be displayed realistically in higher quality, giving users the best possible experience.</t>
        <t><strong>Other Use Cases</strong></t>
        <t>Additionally, oneM2M recently studied several use cases related to edge computing, including: smart factories, smart transportation, an accident notification service, a high-precision road map service, a vulnerable road user service and a vehicular data service. These use cases are documented in <xref target="oneM2M-TR0001"/>, <xref target="oneM2M-TR0018"/> and <xref target="oneM2M-TR0026"/>. Edge computing related requirements raised through the analysis of these use cases are captured in <xref target="oneM2M-TS0002"/>.</t>
      </section>
    </section>
    <section anchor="sec-challenges">
      <name>IoT Challenges Leading Towards Edge Computing</name>
      <t>This section describes challenges met by IoT, that are motivating the adoption of edge computing for IoT. Those are distinct from research challenges applicable to IoT edge computing, some of which will be mentioned in <xref target="sec-components"/>.</t>
      <t>IoT technology is used with more and more demanding applications, e.g. in industrial, automotive or healthcare domains, leading to new challenges.
For example, industrial machines such as laser cutters already produce over 1 terabyte per hour, and similar amounts can be generated in autonomous cars <xref target="NVIDIA"/>.
90% of IoT data is expected to be stored, processed, analyzed, and acted upon close to the source <xref target="Kelly"/>, as cloud computing models alone cannot address the new challenges <xref target="Chiang"/>.</t>
      <t>Below we discuss IoT use case requirements that are moving cloud capabilities to be more proximate and more distributed and disaggregated.</t>
      <section anchor="time-sensitivity">
        <name>Time Sensitivity</name>
        <t>Many industrial control systems, such as manufacturing systems, smart grids, oil and gas systems, etc., often require stringent end-to-end latency between the sensor and control node.
While some IoT applications may require latency below a few tens of milliseconds <xref target="Weiner"/>,
industrial robots and motion control systems have use cases for cycle times in the order of microseconds <xref target="_60802"/>.
In some cases speed-of-light limitations may simply prevent a solution based on remote cloud, however it is not the only challenge relative to time sensitivity.
Guarantees for jitter are also important to those industrial IoT applications.
This means control packets need to arrive with as little variation as possible and within a strict deadline.
Given the best-effort characteristics of the Internet, this challenge is virtually impossible to address, without using end-to-end guarantees for individual message delivery and continuous data flows.</t>
      </section>
      <section anchor="connectivity-cost">
        <name>Connectivity Cost</name>
        <t>Some IoT deployments are not challenged by a constrained network bandwidth to the Cloud.
The fifth generation mobile networks (5G) and Wi-Fi 6 both theoretically top out at 10 gigabits per second (i.e., 4.5 terabytes per hour), which enables high-bandwidth uplinks.
However, the resulting cost for high-bandwidth connectivity to upload all data to the Cloud is unjustifiable and impractical for most IoT applications.
In some settings, e.g. in aeronautical communication, higher communication costs reduce the amount of data that can be practically uploaded even further.</t>
      </section>
      <section anchor="resilience-to-intermittent-services">
        <name>Resilience to Intermittent Services</name>
        <t>Many IoT devices such as sensors, data collectors, actuators, controllers, etc. have very limited hardware resources
and cannot rely solely on their limited resources to meet all their computing and/or storage needs.
They require reliable, uninterrupted, or resilient services to augment their capabilities in order to fulfill their application tasks.
This is hard and partly impossible to achieve with cloud services for systems such as vehicles, drones, or oil rigs that have intermittent network connectivity.
The dual is also true, a cloud back-end might want to have a reading of the device even if it's currently asleep.</t>
      </section>
      <section anchor="sec-priv">
        <name>Privacy and Security</name>
        <t>When IoT services are deployed at home, personal information can be learned from detected usage data.
For example, one can extract information about employment, family status, age, and income by analyzing smart meter data <xref target="ENERGY"/>.
Policy-makers started to provide frameworks that limit the usage of personal data and put strict requirements on data controllers and processors.
However, data stored indefinitely in the Cloud also increases the risk of data leakage, for instance, through attacks on rich targets.</t>
        <t>Industrial systems are often argued to not have privacy implications, as no personal data is gathered.
Yet data from such systems is often highly sensitive, as one might be able to infer trade secrets such as the setup of production lines.
Hence, the owners of these systems are generally reluctant to upload IoT data to the Cloud.</t>
        <t>Furthermore, passive observers can perform traffic analysis on the device-to-cloud path.
Hiding traffic patterns associated with sensor networks can therefore be another requirement for edge computing.</t>
      </section>
    </section>
    <section anchor="iot-edge-computing-functions">
      <name>IoT Edge Computing Functions</name>
      <t>In this section, we first look at the current state of IoT edge computing <xref target="sec-overview"/>, and then define a general system model <xref target="sec-model"/>. This provides context for IoT edge computing functions, which are listed in <xref target="sec-components"/>.</t>
      <section anchor="sec-overview">
        <name>Overview of IoT Edge Computing Today</name>
        <t>This section provides an overview of today's IoT edge computing field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background"/>.</t>
        <t>IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) and proprietary (such as Amazon Greengrass, Microsoft Azure IoT Edge, Google Cloud IoT Core, and gateways from Bosh, Siemens), represent a common class of IoT edge computing products, where the gateway is providing a local service on customer premises and is remotely managed through a cloud service. IoT communication protocols are typically used between IoT devices and the gateway, including CoAP, MQTT, and many specialized IoT protocols (such as OPC UA and DDS in the Industrial IoT space), while the gateway communicates with the distant cloud typically using HTTPS. Virtualization platforms enable the deployment of virtual edge computing functions (using VMs, application containers, etc.), including IoT gateway software, on servers in the mobile network infrastructure (at base stations and concentration points), in edge data centers (in central offices) or regional data centers located near central offices. End devices are envisioned to become computing devices in forward-looking projects, but they are not commonly used as such today.</t>
        <t>Besides open-source and proprietary solutions, a horizontal IoT service layer is standardized by the oneM2M standards body, to reduce fragmentation, increase interoperability and promote reuse in the IoT ecosystem.</t>
        <t>Physical or virtual IoT gateways can host application programs, which are typically built using an SDK to access local services through a programmatic API.
Edge cloud system operators host their customers' applications VMs or containers on servers located in or near access networks, which can implement local edge services. For example, mobile networks can provide edge services for radio network information, location, and bandwidth management.</t>
        <t>Life cycle management of services and applications on physical IoT gateways is often cloud-based.
Edge cloud management platforms and products (such as StarlingX, Akraino Edge Stack, Mobile EdgeX) adapt cloud management technologies (e.g., Kubernetes) to the edge cloud, i.e., to smaller, distributed computing devices running outside a controlled data center. Services and application life-cycle is typically using an NFV-like management and orchestration model.</t>
        <t>Resilience in IoT often entails the ability to operate autonomously in periods of disconnectedness in order to preserve the integrity and safety of the controlled system, possibly in a degraded mode. IoT devices and gateways are often expected to operate in the always-on and unattended mode, using fault detection and unassisted recovery functions.</t>
        <t>The platform typically includes services to advertise or consume APIs (e.g., Mp1 interface in ETSI MEC supports service discovery and communication), and enables communicating with local and remote endpoints (e.g., message routing function in IoT gateways). The service platform is typically extensible by edge applications, since they can advertise an API that other edge applications can consume. IoT communication services include protocols translation, analytics, and transcoding. Communication between edge computing devices is enabled in tiered deployments or distributed deployments.</t>
        <t>An edge cloud platform may enable pass-through without storage or local storage (e.g., on IoT gateways). Some edge cloud platforms use a distributed form of storage such as an ICN network, e.g., Named Function Networking (NFN) nodes can store data in a Named Data Networking (NDN) system, or a distributed storage platform (e.g., IPFS, EdgeFS, Ceph). External storage, e.g., on databases in distant or local IT cloud, is typically used for filtered data deemed worthy of long-term storage, although in some cases it may be for all data, for example when required for regulatory reasons.</t>
        <t>Stateful computing is supported on platforms hosting native programs, VMs or containers. Stateless computing is supported on platforms providing a "serverless computing" service (a.k.a. function-as-a-service, e.g., using stateless containers), or on systems based on named function networking.</t>
        <t>In many IoT use cases, a typical network usage pattern is high volume uplink with some form of traffic reduction enabled by processing over edge computing devices. Alternatives to traffic reduction include deferred transmission (to off-peak hours or using physical shipping). Downlink traffic includes application control and software updates. Other, downlink-heavy traffic patterns are not excluded but are more often associated with non-IoT usage (e.g., video CDNs).</t>
      </section>
      <section anchor="sec-model">
        <name>General Model</name>
        <t>Edge computing is expected to play an important role in deploying new IoT services integrated with Big Data and AI, enabled by flexible in-network computing platforms. Although there are lots of approaches to edge computing, we attempt to lay out a general model and list associated logical functions in this section. In practice, this model can map to different architectures, such as:</t>
        <ul spacing="normal">
          <li>A single IoT gateway, or a hierarchy of IoT gateways, typically connected to the cloud (e.g., to extend the traditional cloud-based management of IoT devices and data to the edge). A common role of an IoT Gateway is to provide access to a heterogeneous set of IoT devices/sensors; handle IoT data; and deliver IoT data to its final destination in a cloud network. Whereas an IoT gateway needs  interactions with the cloud, it can also operate independently in a disconnected mode.</li>
          <li>A set of distributed computing nodes, e.g., embedded in switches, routers, edge cloud servers, or mobile devices. Some IoT end devices can have enough computing capabilities to participate in such distributed systems due to advances in hardware technology. In this model, edge computing nodes can collaborate to share their resources.</li>
        </ul>
        <t>In the general model described in <xref target="rl-fig1"/>, the edge computing domain is interconnected with IoT end devices (southbound connectivity) and possibly with a remote/cloud network (northbound connectivity), and with a service operator's system.
Edge computing nodes provide multiple logical functions, or components, which may not all be present in a given system. They may be implemented in a centralized or distributed fashion, at the network edge, or through some interworking between edge network and remote cloud network.</t>
        <figure anchor="rl-fig1">
          <name>Model of IoT Edge Computing</name>
          <artwork align="center"><![CDATA[
   +---------------------+
   |   Remote network    |  +---------------+
   |(e.g., cloud network)|  |   Service     |
   +-----------+---------+  |   Operator    |
               |            +------+--------+
               |                   |
+--------------+-------------------+-----------+
|            Edge Computing Domain             |
|                                              |
|   One or more Computing Nodes                |
|   (IoT gateway, end devices, switches,       |
|   routers, mini/micro-data centers, etc.)    |
|                                              |
|   OAM Components                             |
|   - Resource Discovery and Authentication    |
|   - Edge Organization and Federation         |
|   - Multi-Tenancy and Isolation              |
|   - ...                                      |
|                                              |
|   Functional Components                      |
|   - In-Network Computation                   |
|   - Edge Caching                             |
|   - North/South-bound Communication          |
|   - Communication Brokering                  |
|   - Other Services                           |
|   - ...                                      |
|                                              |
|   Application Components                     |
|   - IoT End Devices Management               |
|   - Data Management and Analytics            |
|   - ...                                      |
|                                              |
+------+--------------+-------- - - - -+- - - -+
       |              |       |        |       |
       |              |          +-----+--+
  +----+---+    +-----+--+    |  |compute |    |
  |  End   |    |  End   | ...   |node/end|
  |Device 1|    |Device 2| ...|  |device n|    |
  +--------+    +--------+       +--------+
                              + - - - - - - - -+
]]></artwork>
        </figure>
        <t>In the distributed model described in <xref target="rl-fig2"/>, the edge computing domain is composed of IoT edge gateways and IoT end devices which are also used as computing nodes.
Edge computing domains are connected with a remote/cloud network, and with their respective service operator's system.
IoT end devices/computing nodes provide logical functions, as part of a distributed machine learning application. The processing capabilities in IoT end devices being limited, they require the support of other nodes: the training process for AI services is executed at IoT edge gateways or cloud networks and the prediction (inference) service is executed in the IoT end devices.</t>
        <figure anchor="rl-fig2">
          <name>Example: Machine Learning over a Distributed IoT Edge Computing System</name>
          <artwork align="center"><![CDATA[
+----------------------------------------------+
|            Edge Computing Domain             |
|                                              |
| +--------+    +--------+        +--------+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device m|   |
| +----+---+    +----+---+        +----+---+   |
|      |             |                 |       |
|  +---+-------------+-----------------+--+    |
|  |           IoT Edge Gateway           |    |
|  +-----------+-------------------+------+    |
|              |                   |           |
+--------------+-------------------+-----------+
               |                   |
   +-----------+---------+  +------+-------+
   |   Remote network    |  |   Service    |
   |(e.g., cloud network)|  |  Operator(s) |
   +-----------+---------+  +------+-------+
               |                   |
+--------------+-------------------+-----------+
|              |                   |           |
|  +-----------+-------------------+------+    |
|  |           IoT Edge Gateway           |    |
|  +---+-------------+-----------------+--+    |
|      |             |                 |       |
| +----+---+    +----+---+        +----+---+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device n|   |
| +--------+    +--------+        +--------+   |
|                                              |
|            Edge Computing Domain             |
+----------------------------------------------+
]]></artwork>
        </figure>
        <t>We now attempt to enumerate major edge computing domain components. They are here loosely organized into OAM (Operations, Administration, and Maintenance), functional and application components, with the understanding that the distinction between these classes may not always be clear, depending on actual system architectures. Some representative research challenges are associated with those functions. We used input from co-authors, IRTF attendees, and some comprehensive reviews of the field (<xref target="Yousefpour"/>, <xref target="Zhang2"/>, <xref target="Khan"/>).</t>
      </section>
      <section anchor="sec-components">
        <name>OAM Components</name>
        <t>Edge computing OAM goes beyond the network-related OAM functions listed in <xref target="RFC6291"/>. Besides infrastructure (network, storage, and computing resources), edge computing systems can also include computing environments (for VMs, software containers, functions), IoT end devices, data, and code.</t>
        <t>Operation-related functions include performance monitoring for service level agreement measurement; fault management and provisioning for links, nodes, compute and storage resources, platforms, and services. Administration covers network/compute/storage resources, platforms and services discovery, configuration, and planning. Discovery during normal operation (e.g., discovery of compute nodes by endpoints) would typically not be included in OAM, however in this document we will not address it separately. Management covers monitoring and diagnostics of failures, as well as means to minimize their occurrence and take corrective actions. This may include software updates management, high service availability through redundancy and multipath communication. Centralized (e.g., SDN) and decentralized management systems can be used. Finally, we arbitrarily chose to address data management as an application component, however, in some systems, data management may be considered to be similar to a network management function.</t>
        <t>We further detail a few OAM components.</t>
        <section anchor="sec-dis-auth">
          <name>Resource Discovery and Authentication</name>
          <t>Discovery and authentication may target platforms, infrastructure resources, such as compute, network and storage, but also other resources such as IoT end devices, sensors, data, code units, services, applications, or users interacting with the system. Broker-based solutions can be used, e.g., using an IoT gateway as a broker to discover IoT resources. More decentralized solutions can also be used in replacement or complement, e.g., CoAP enables multicast discovery of an IoT device, and CoAP service discovery enables obtaining a list of resources made available by this device <xref target="RFC7252"/>. Today, centralized gateway-based systems rely, for device authentication, on the installation of a secret on IoT end devices and computing devices (e.g., a device certificate stored in a hardware security module, or a combination of code and data stored in a trusted execution environment).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Discovery, authentication, and trust establishment between end devices, compute nodes, and platforms, with regard to concerns such as mobility, heterogeneous devices and networks, scale, multiple trust domains, constrained devices, anonymity, and traceability</li>
            <li>Intermittent connectivity to the Internet, preventing relying on a third-party authority <xref target="Echeverria"/></li>
            <li>Resiliency to failures <xref target="Harchol"/>, denial of service attacks, easier physical access for attackers</li>
          </ul>
        </section>
        <section anchor="edge-organization-and-federation">
          <name>Edge Organization and Federation</name>
          <t>In a distributed system context, once edge devices have discovered and authenticated each other, they can be organized, or self-organize, into hierarchies or clusters. The organization structure may range from centralized to peer-to-peer, or it may be closely tied with other systems. Such groups can also form federations with other edge or remote clouds.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Support for scaling, and enabling fault-tolerance or self-healing <xref target="Jeong"/>. Besides using hierarchical organization to cope with scaling, another available and possibly complementary mechanism is multicast (<xref target="RFC7390"/> <xref target="I-D.ietf-core-oscore-groupcomm"/>)</li>
            <li>Integration of edge computing with virtualized Radio Access Networks (Fog RAN) <xref target="I-D.bernardos-sfc-fog-ran"/> and with 5G access networks</li>
            <li>Sharing resources in multi-vendor/operator scenarios, to optimize criteria such as profit <xref target="Anglano"/>, resource usage, latency, or energy consumption</li>
            <li>Capacity planning, placement of infrastructure nodes to minimize delay <xref target="Fan"/>, cost, energy, etc.</li>
            <li>Incentives for participation, e.g. in peer-to-peer federation schemes</li>
          </ul>
        </section>
        <section anchor="multi-tenancy-and-isolation">
          <name>Multi-Tenancy and Isolation</name>
          <t>Some IoT edge computing systems make use of virtualized (compute, storage and networking) resources to address the need for secure multi-tenancy at the edge. This leads to "edge clouds" that share properties with the remote Cloud and can reuse some of its ecosystem. Virtualization function management is covered to a large extent by ETSI NFV and MEC standards activities. Projects such as <xref target="LFEDGE-EVE"/> further cover virtualization and its management into distributed edge computing settings.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Adapting cloud management platforms to the edge, to account for its distributed nature, e.g., using Conflict-free Replicated Data Types (CRDT) <xref target="Jeffery"/>, heterogeneity and customization, e.g., using intent-based management mechanisms <xref target="Cao"/>, and limited resources.</li>
            <li>Minimizing virtual function instantiation time and resource usage</li>
          </ul>
        </section>
      </section>
      <section anchor="functional-components">
        <name>Functional Components</name>
        <section anchor="in-network-computation">
          <name>In-Network Computation</name>
          <t>A core function of IoT edge computing is to enable local computation on a node at the network edge, e.g. processing input data from sensors, making local decisions, preprocessing data, offloading computation on behalf of a device, service, or user. Related functions include orchestrating computation (in a centralized or distributed manner) and managing applications lifecycle. Support for in-network computation may vary in terms of capability, e.g., computing nodes can host virtual machines, software containers, software actors or unikernels able to run stateful or stateless code, or a rules engine providing an API to register actions in response to conditions such as IoT device ID, sensor values to check, thresholds, etc.</t>
          <t>Edge offloading include offloading to and from an IoT device, and to and from a network node. <xref target="Cloudlets"/> offer an example of offloading from an end device to a network node. On the other side, oneM2M is an example of a system that allows a cloud-based IoT platform to transfer resources and tasks to a target edge node <xref target="oneM2M-TR0052"/>. Once transferred, the edge node can directly support IoT devices it serves with the service offloaded by the cloud (e.g. group management, location management, etc.)</t>
          <t>QoS can be provided in some systems through the combination of network QoS (e.g., traffic engineering or wireless resource scheduling) and compute/storage resource allocations. For example, in some systems, a bandwidth manager service can be exposed to enable allocation of bandwidth to/from an edge computing application instance.</t>
          <t>In-network computation may leverage underlying services, provided using data generated by IoT devices and access networks. Such services include end device location, radio network information, bandwidth management and congestion management (e.g., by the congestion management feature of oneM2M <xref target="oneM2M-TR0052"/>).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>(Computation placement) Selecting, in a centralized or distributed/peer-to-peer manner, an appropriate compute device based on available resources, location of data input and data sinks, compute node properties, etc., and with varying goals including for example end-to-end latency, privacy, high availability, energy conservation, or network efficiency, e.g. using load balancing techniques to avoid congestion</li>
            <li>Onboarding code on a platform or computing device, and invoking remote code execution, possibly as part of a distributed programming model and with respect to similar concerns of latency, privacy, etc. These operations should deal with heterogeneous compute nodes <xref target="Schafer"/>, and may in some cases also support end devices, including IoT devices, as compute nodes <xref target="Larrea"/></li>
            <li>Adapting Quality of Results (QoR) for applications where a perfect result is not necessary <xref target="Li"/></li>
            <li>Assisted or automatic partitioning of code <xref target="I-D.sarathchandra-coin-appcentres"/></li>
            <li>Supporting computation across trust domains, e.g. verifying computation results</li>
            <li>Support for computation mobility: relocating an instance from one compute node to another, while maintaining a given service level. Session continuity when communicating with end devices that are mobile, possibly at high speed (e.g. in vehicular scenarios). Defining lightweight execution environments for secure code mobility, e.g., using WebAssembly <xref target="Nieke"/></li>
            <li>Defining, managing, and verifying Service Level Agreements (SLA) for edge computing systems. Pricing is a related challenge</li>
          </ul>
        </section>
        <section anchor="edge-storage-and-caching">
          <name>Edge Storage and Caching</name>
          <t>Local storage or caching enable local data processing (e.g., pre-processing or analysis), as well as delayed data transfer to the cloud or delayed physical shipping.
An edge node may offer local data storage (where persistence is subject to retention policies), caching, or both.
Caching generally refers to temporary storage to improve performance with no persistence guarantees.
An edge caching component manages data persistence, e.g., it schedules removal of data when it is no longer needed.
Other related aspects include authenticating and encrypting data.
Edge storage and caching can take the form of a distributed storage system.</t>
          <t>Related challenges include</t>
          <ul spacing="normal">
            <li>(Cache and data placement) Using cache positioning and data placement strategies to minimize data retrieval delay <xref target="Liu"/>, energy consumption. Caches may be positioned in the access network infrastructure, or on end devices</li>
            <li>Maintaining consistency, freshness, and privacy of stored/cached data in systems that are distributed, constrained, and dynamic (e.g. due to end devices and computing nodes churn or mobility). For example, <xref target="Mortazavi"/> exploits a hierarchical storage organization. Freshness-related metrics include the age of information <xref target="Yates"/>, that captures the timeliness of information from a sender (e.g. an IoT device).</li>
          </ul>
        </section>
        <section anchor="northboundsouthbound-communication">
          <name>Northbound/Southbound Communication</name>
          <t>An edge cloud may provide a northbound data plane or management plane interface to a remote network, e.g., a cloud, home or enterprise network. This interface does not exist in standalone (local-only) scenarios. To support such an interface when it exists, an edge computing component needs to expose an API, deal with authentication and authorization, support secure communication.</t>
          <t>An edge cloud may provide an API or interface to local or mobile users, for example, to provide access to services and applications, or to manage data published by local/mobile devices.</t>
          <t>Edge computing nodes communicate with IoT devices over a southbound interface, typically for data acquisition and IoT end device management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Defining edge computing abstractions, such as PaaS <xref target="Yangui"/>, suitable for users and cloud systems to interact with edge computing systems, and dealing with interoperability issues such as data models heterogeneity.</li>
          </ul>
        </section>
        <section anchor="communication-brokering">
          <name>Communication Brokering</name>
          <t>A typical function of IoT edge computing is to facilitate communication with IoT end devices: for example, enable clients to register as recipients for data from devices, as well as forwarding/routing of traffic to or from IoT end devices, enabling various data discovery and redistribution patterns, e.g., north-south with clouds, east-west with other edge devices <xref target="I-D.mcbride-edge-data-discovery-overview"/>.
Another related aspect is dispatching alerts and notifications to interested consumers both inside and outside of the edge computing domain.
Protocol translation, analytics, and video transcoding may also be performed when necessary.</t>
          <t>Communication brokering may be centralized in some systems, e.g., using a hub-and-spoke message broker, or distributed like with message buses, possibly in a layered bus approach.
Distributed systems may leverage direct communication between end devices, over device-to-device links.
A broker can ensure communication reliability, traceability, and in some cases transaction management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Enabling secure and resilient communication between IoT end devices and remote cloud, e.g. through multipath support</li>
          </ul>
        </section>
      </section>
      <section anchor="application-components">
        <name>Application Components</name>
        <t>IoT edge computing can host applications such as the ones mentioned in <xref target="sec-uc"/>. While describing components of individual applications is out of our scope, some of those applications share similar functions, such as IoT end device management, data management, described below.</t>
        <section anchor="iot-end-devices-management">
          <name>IoT End Devices Management</name>
          <t>IoT end device management includes managing information about the IoT devices, including their sensors, how to communicate with them, etc. Edge computing addresses the scalability challenges from the massive number of IoT end devices by separating the scalability domain into edge/local networks and remote networks. For example, in the context of the oneM2M standard, the software campaign feature enables installing, deleting, activating, and deactivating software functions/services on a potentially large number of edge nodes <xref target="oneM2M-TR0052"/>. Using a dashboard or a management software, a service provider issues those requests through an IoT cloud platform supporting the software campaign functionality.</t>
          <t>Challenges listed in <xref target="sec-dis-auth"/> may be applicable to IoT end devices management as well.</t>
        </section>
        <section anchor="sec-data">
          <name>Data Management and Analytics</name>
          <t>Data storage and processing at the edge is a major aspect of IoT edge computing, directly addressing high-level IoT challenges listed in <xref target="sec-challenges"/>. Data analysis such as performed in AI/ML tasks performed at the edge may benefit from specialized hardware support on computing nodes.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Addressing concerns on resource usage, security, and privacy when sharing, processing, discovering, or managing data. For example by presenting data in views composed of an aggregation of related data <xref target="Zhang"/>; protecting data communication between authenticated peers <xref target="Basudan"/>; classifying data (e.g., in terms of privacy, importance, validity, etc.); compressing and encrypting data, e.g., using homomorphic encryption to directly process encrypted data <xref target="Stanciu"/>.</li>
            <li>Other concerns on edge data discovery (e.g., streaming data, metadata, events) include siloization and lack of standard in edge environments that can be dynamic (e.g. vehicular networks) and heterogeneous <xref target="I-D.mcbride-edge-data-discovery-overview"/></li>
            <li>Data-driven programming models <xref target="Renart"/>, e.g. event-based, including handling of naming and data abstractions</li>
            <li>Addressing concerns such as limited resources, privacy, dynamic and heterogeneous environment, to deploy machine learning at the edge. For example, making machine learning more lightweight and distributed (e.g., to enable distributed inference at the edge), supporting shorter training time and simplified models, and supporting models that can be compressed for efficient communication <xref target="Murshed"/></li>
            <li>While edge computing can support IoT services independently of cloud computing, it can also be connected to cloud computing. Thus, the relationship of IoT edge computing to cloud computing, with regard to data management, is another potential challenge <xref target="ISO_TR"/></li>
          </ul>
        </section>
      </section>
      <section anchor="simulation-and-emulation-environments">
        <name>Simulation and Emulation Environments</name>
        <t>IoT Edge Computing brings new challenges to simulation and emulation tools used by researchers and developers. A varied set of applications, network, and computing technologies can coexist in a distributed system, which makes modeling difficult. Scale, mobility, and resource management are additional challenges <xref target="SimulatingFog"/>.</t>
        <t>Tools include simulators, where simplified application logic runs on top of a fog network model, and emulators, where actual applications can be deployed, typically in software containers, over a cloud infrastructure (e.g. Docker, Kubernetes) itself running over a network emulating network edge conditions such as variable delays, throughput and mobility events. To gain in scale, emulated and simulated systems can be used together in hybrid federation-based approaches <xref target="PseudoDynamicTesting"/>, while to gain in realism physical devices can be interconnected with emulated systems. Examples of related work and platforms include the publicly accessible MEC sandbox work recently initiated in ETSI <xref target="ETSI_Sandbox"/>, and open source simulators and emulators (<xref target="AdvantEDGE"/> emulator and tools cited in <xref target="SimulatingFog"/>). EdgeNet <xref target="Senel"/> is a globally distributed edge cloud for Internet researchers, using nodes contributed by institutions, and based on Docker for containerization and Kubernetes for deployment and node management.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Privacy and security are drivers for the adoption of edge computing for IoT (<xref target="sec-priv"/>). As discussed in <xref target="sec-dis-auth"/>, authentication and trust (between computing nodes, management nodes, end devices) can be challenging as scale, mobility, and heterogeneity increase. The sometimes disconnected nature of edge resources can prevent relying on a third-party authority. Distributed edge computing is exposed to issues with reliability and denial of service attacks. Personal or proprietary IoT data leakage is also a major threat, especially due to the distributed nature of the systems (<xref target="sec-data"/>).</t>
      <t>However, edge computing also brings solutions in the security space: maintaining privacy by computing sensitive data closer to data generators is a major use case for IoT edge computing. An edge cloud can be used to take actions based on sensitive data, or anonymizing, aggregating or compressing data prior to transmitting to a remote cloud server. Edge computing communication brokering functions can also be used to secure communication between edge and cloud networks.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>IoT edge computing plays an essential role, complementary to the cloud, to enable IoT systems in some situations. This document starts by presenting use cases and listing core challenges faced by IoT, that drive the need for IoT edge computing. The first part of this document may therefore help focusing future research efforts on the aspects of IoT edge computing where it is most useful. A second part of this document presents a general system model and a structured overview of the associated research challenges and related work. The structure, based on the system model, is not meant to be restrictive, and exists for the purpose of having a link between individual research areas and where they are applicable in an IoT edge computing system.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-Jose Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed, JaeSeung Song, Roberto Morabito, Carsten Bormann and Ari Keranen for their valuable comments and suggestions on this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.mcbride-edge-data-discovery-overview" target="https://www.ietf.org/archive/id/draft-mcbride-edge-data-discovery-overview-05.txt">
        <front>
          <title>Edge Data Discovery for COIN</title>
          <author fullname="Mike McBride">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Dirk Kutscher">
            <organization>Emden University</organization>
          </author>
          <author fullname="Eve Schooler">
            <organization>Intel</organization>
          </author>
          <author fullname="Carlos J. Bernardos">
            <organization>Universidad Carlos III de Madrid</organization>
          </author>
          <author fullname="Diego R. Lopez">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Xavier de Foy">
            <organization>InterDigital Communications, LLC</organization>
          </author>
          <date day="1" month="November" year="2020"/>
          <abstract>
            <t>   This document describes the problem of distributed data discovery in
   edge computing, and in particular for computing-in-the-network
   (COIN), which may require both the marshalling of data at the outset
   of a computation and the persistence of the resultant data after the
   computation.  Although the data might originate at the network edge,
   as more and more distributed data is created, processed, and stored,
   it becomes increasingly dispersed throughout the network.  There
   needs to be a standard way to find it.  New and existing protocols
   will need to be developed to support distributed data discovery at
   the network edge and beyond.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-mcbride-edge-data-discovery-overview-05"/>
      </reference>
      <reference anchor="RFC6291" target="https://www.rfc-editor.org/info/rfc6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson">
            <organization/>
          </author>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort">
            <organization/>
          </author>
          <author fullname="R. Bonica" initials="R." surname="Bonica">
            <organization/>
          </author>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu">
            <organization/>
          </author>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield">
            <organization/>
          </author>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood.  Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM.  There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term.  This memo documents an Internet Best Current  Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="Ashton" target="http://www.itrco.jp/libraries/RFIDjournal-That%20Internet%20of%20Things%20Thing.pdf">
        <front>
          <title>That Internet of Things thing</title>
          <author initials="K." surname="Ashton">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
        <refcontent>RFID J. vol. 22, no. 7, pp. 97-114</refcontent>
      </reference>
      <reference anchor="Lin">
        <front>
          <title>A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications</title>
          <author initials="J." surname="Lin" fullname="Jie Lin">
            <organization/>
          </author>
          <author initials="W." surname="Yu" fullname="Wei Yu">
            <organization/>
          </author>
          <author initials="N." surname="Zhang" fullname="Nan Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Yang" fullname="Xinyu Yang">
            <organization/>
          </author>
          <author initials="H." surname="Zhang" fullname="Hanlin Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Zhao" fullname="Wei Zhao">
            <organization/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 4, no. 5, pp. 1125-1142"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2683200"/>
      </reference>
      <reference anchor="NIST">
        <front>
          <title>The NIST definition of cloud computing</title>
          <author initials="P." surname="Mell" fullname="P M Mell">
            <organization/>
          </author>
          <author initials="T." surname="Grance" fullname="T Grance">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
        <seriesInfo name="National Institute of Standards and Technology" value="report"/>
        <seriesInfo name="DOI" value="10.6028/nist.sp.800-145"/>
      </reference>
      <reference anchor="Botta">
        <front>
          <title>Integration of Cloud computing and Internet of Things: A survey</title>
          <author initials="A." surname="Botta" fullname="Alessio Botta">
            <organization/>
          </author>
          <author initials="W." surname="de Donato" fullname="Walter de Donato">
            <organization/>
          </author>
          <author initials="V." surname="Persico" fullname="Valerio Persico">
            <organization/>
          </author>
          <author initials="A." surname="Pescape" fullname="Antonio Pescape">
            <organization/>
          </author>
          <date year="2016" month="March"/>
        </front>
        <seriesInfo name="Future Generation Computer Systems" value="vol. 56, pp. 684-700"/>
        <seriesInfo name="DOI" value="10.1016/j.future.2015.09.021"/>
      </reference>
      <reference anchor="Shi">
        <front>
          <title>Edge Computing: Vision and Challenges</title>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization/>
          </author>
          <author initials="J." surname="Cao" fullname="Jie Cao">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization/>
          </author>
          <author initials="Y." surname="Li" fullname="Youhuizi Li">
            <organization/>
          </author>
          <author initials="L." surname="Xu" fullname="Lanyu Xu">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 3, no. 5, pp. 637-646"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2579198"/>
      </reference>
      <reference anchor="Mahadev">
        <front>
          <title>The Emergence of Edge Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="Mahadev Satyanarayanan">
            <organization/>
          </author>
          <date year="2017" month="January"/>
        </front>
        <seriesInfo name="Computer" value="vol. 50, no. 1, pp. 30-39"/>
        <seriesInfo name="DOI" value="10.1109/mc.2017.9"/>
      </reference>
      <reference anchor="Chiang">
        <front>
          <title>Fog and IoT: An Overview of Research Opportunities</title>
          <author initials="M." surname="Chiang" fullname="Mung Chiang">
            <organization/>
          </author>
          <author initials="T." surname="Zhang" fullname="Tao Zhang">
            <organization/>
          </author>
          <date year="2016" month="December"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 3, no. 6, pp. 854-864"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2584538"/>
      </reference>
      <reference anchor="Weiner">
        <front>
          <title>Design of a low-latency, high-reliability wireless communication system for control applications</title>
          <author initials="M." surname="Weiner" fullname="Matthew Weiner">
            <organization/>
          </author>
          <author initials="M." surname="Jorgovanovic" fullname="Milos Jorgovanovic">
            <organization/>
          </author>
          <author initials="A." surname="Sahai" fullname="Anant Sahai">
            <organization/>
          </author>
          <author initials="B." surname="Nikolie" fullname="Borivoje Nikolie">
            <organization/>
          </author>
          <date year="2014" month="June"/>
        </front>
        <seriesInfo name="2014 IEEE International Conference on Communications" value="(ICC)"/>
        <seriesInfo name="DOI" value="10.1109/icc.2014.6883918"/>
      </reference>
      <reference anchor="Kelly" target="https://campustechnology.com/articles/2015/04/15/internet-of-things-data-to-top-1-6-zettabytes-by-2020.aspx">
        <front>
          <title>Internet of Things Data to Top 1.6 Zettabytes by 2022</title>
          <author initials="R." surname="Kelly">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <refcontent>Retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="ISO_TR" target="https://www.iso.org/standard/53284.html">
        <front>
          <title>Internet of things (IoT) - Edge computing</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <seriesInfo name="ISO/IEC" value="TR 30164"/>
      </reference>
      <reference anchor="OpenFog" target="https://iiconsortium.org/pdf/OpenFog_Reference_Architecture_2_09_17.pdf">
        <front>
          <title>OpenFog Reference Architecture for Fog Computing</title>
          <author>
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="OpenFog Consortium" value=""/>
      </reference>
      <reference anchor="ETSI_MEC_03" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf">
        <front>
          <title>Mobile Edge Computing (MEC); Framework and Reference Architecture</title>
          <author>
            <organization>ETSI</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>ETSI GS 003</refcontent>
      </reference>
      <reference anchor="ETSI_MEC_01" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf">
        <front>
          <title>Multi-access Edge Computing (MEC); Terminology</title>
          <author initials="" surname="ETSI">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>ETSI GS 001</refcontent>
      </reference>
      <reference anchor="NVIDIA" target="https://devblogs.nvidia.com/training-self-driving-vehicles-challenge-scale/">
        <front>
          <title>Training AI for Self-Driving Vehicles: the Challenge of Scale</title>
          <author initials="A." surname="Grzywaczewski">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <refcontent>NVIDIA Developer Blog, retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="_60802" target="https://grouper.ieee.org/groups/802/1/files/public/docs2018/60802-industrial-use-cases-0918-v13.pdf">
        <front>
          <title>Use Cases IEC/IEEE 60802 V1.3</title>
          <author>
            <organization>IEC/IEEE</organization>
          </author>
          <date year="2018"/>
        </front>
        <seriesInfo name="IEC/IEEE" value="60802"/>
      </reference>
      <reference anchor="ENERGY">
        <front>
          <title>Revealing household characteristics from smart meter data</title>
          <author initials="C." surname="Beckel" fullname="Christian Beckel">
            <organization/>
          </author>
          <author initials="L." surname="Sadamori" fullname="Leyna Sadamori">
            <organization/>
          </author>
          <author initials="T." surname="Staake" fullname="Thorsten Staake">
            <organization/>
          </author>
          <author initials="S." surname="Santini" fullname="Silvia Santini">
            <organization/>
          </author>
          <date year="2014" month="December"/>
        </front>
        <seriesInfo name="Energy" value="vol. 78, pp. 397-410"/>
        <seriesInfo name="DOI" value="10.1016/j.energy.2014.10.025"/>
      </reference>
      <reference anchor="ETSI_Sandbox" target="https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=57671">
        <front>
          <title>Multi-access Edge Computing (MEC) MEC Sandbox Work Item</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Portal</refcontent>
      </reference>
      <reference anchor="AdvantEDGE" target="https://github.com/InterDigitalInc/AdvantEDGE">
        <front>
          <title>Mobile Edge Emulation Platform</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Source Code Repository</refcontent>
      </reference>
      <reference anchor="SimulatingFog">
        <front>
          <title>Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges</title>
          <author initials="S." surname="Svorobej" fullname="Sergej Svorobej">
            <organization/>
          </author>
          <author initials="P." surname="Takako Endo" fullname="Patricia Takako Endo">
            <organization/>
          </author>
          <author initials="M." surname="Bendechache" fullname="Malika Bendechache">
            <organization/>
          </author>
          <author initials="C." surname="Filelis-Papadopoulos" fullname="Christos Filelis-Papadopoulos">
            <organization/>
          </author>
          <author initials="K." surname="Giannoutakis" fullname="Konstantinos Giannoutakis">
            <organization/>
          </author>
          <author initials="G." surname="Gravvanis" fullname="George Gravvanis">
            <organization/>
          </author>
          <author initials="D." surname="Tzovaras" fullname="Dimitrios Tzovaras">
            <organization/>
          </author>
          <author initials="J." surname="Byrne" fullname="James Byrne">
            <organization/>
          </author>
          <author initials="T." surname="Lynn" fullname="Theo Lynn">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <seriesInfo name="Future Internet" value="vol. 11, no. 3, pp. 55"/>
        <seriesInfo name="DOI" value="10.3390/fi11030055"/>
      </reference>
      <reference anchor="PseudoDynamicTesting">
        <front>
          <title>Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems</title>
          <author initials="M." surname="Ficco" fullname="Massimo Ficco">
            <organization/>
          </author>
          <author initials="C." surname="Esposito" fullname="Christian Esposito">
            <organization/>
          </author>
          <author initials="Y." surname="Xiang" fullname="Yang Xiang">
            <organization/>
          </author>
          <author initials="F." surname="Palmieri" fullname="Francesco Palmieri">
            <organization/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="vol. 55, no. 11, pp. 98-104"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2017.1700328"/>
      </reference>
      <reference anchor="LFEDGE-EVE" target="https://www.lfedge.org/projects/eve">
        <front>
          <title>Project Edge Virtualization Engine (EVE)</title>
          <author initials="" surname="Linux Foundation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Portal, retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="Yousefpour">
        <front>
          <title>All one needs to know about fog computing and related edge computing paradigms: A complete survey</title>
          <author initials="A." surname="Yousefpour" fullname="Ashkan Yousefpour">
            <organization/>
          </author>
          <author initials="C." surname="Fung" fullname="Caleb Fung">
            <organization/>
          </author>
          <author initials="T." surname="Nguyen" fullname="Tam Nguyen">
            <organization/>
          </author>
          <author initials="K." surname="Kadiyala" fullname="Krishna Kadiyala">
            <organization/>
          </author>
          <author initials="F." surname="Jalali" fullname="Fatemeh Jalali">
            <organization/>
          </author>
          <author initials="A." surname="Niakanlahiji" fullname="Amirreza Niakanlahiji">
            <organization/>
          </author>
          <author initials="J." surname="Kong" fullname="Jian Kong">
            <organization/>
          </author>
          <author initials="J." surname="Jue" fullname="Jason P. Jue">
            <organization/>
          </author>
          <date year="2019" month="September"/>
        </front>
        <seriesInfo name="Journal of Systems Architecture" value="vol. 98, pp. 289-330"/>
        <seriesInfo name="DOI" value="10.1016/j.sysarc.2019.02.009"/>
      </reference>
      <reference anchor="I-D.bernardos-sfc-fog-ran" target="https://www.ietf.org/archive/id/draft-bernardos-sfc-fog-ran-10.txt">
        <front>
          <title>Service Function Chaining Use Cases in Fog RAN</title>
          <author fullname="Carlos J. Bernardos">
            <organization>UC3M</organization>
          </author>
          <author fullname="Alain Mourad">
            <organization>InterDigital</organization>
          </author>
          <date day="22" month="October" year="2021"/>
          <abstract>
            <t>   Fog Radio Access Networks (RAN) refers to the part of the RAN that is
   virtualized at the very edge of the network, even at the end-user
   device.  Fog RAN support is considered critical for the 5G mobile
   network architectures currently being developed in various research,
   standardization and industry forums.  Since fog RAN builds on top of
   virtualization and can involve several virtual functions running on
   different virtualized resources, Service function chaining (SFC)
   support for the fog RAN will be critical.  This document describes
   the overall fog RAN approach and also gives some use cases.  Finally
   it proposes some requirements to be considered in the development of
   the SFC architecture and related protocols.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bernardos-sfc-fog-ran-10"/>
      </reference>
      <reference anchor="Schafer">
        <front>
          <title>Tasklets: Overcoming Heterogeneity in Distributed Computing Systems</title>
          <author initials="D." surname="Schafer" fullname="Dominik Schafer">
            <organization/>
          </author>
          <author initials="J." surname="Edinger" fullname="Janick Edinger">
            <organization/>
          </author>
          <author initials="S." surname="VanSyckel" fullname="Sebastian VanSyckel">
            <organization/>
          </author>
          <author initials="J." surname="Paluska" fullname="Justin Mazzola Paluska">
            <organization/>
          </author>
          <author initials="C." surname="Becker" fullname="Christian Becker">
            <organization/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <seriesInfo name="2016 IEEE 36th International Conference on Distributed Computing Systems Workshops" value="(ICDCSW)"/>
        <seriesInfo name="DOI" value="10.1109/icdcsw.2016.22"/>
      </reference>
      <reference anchor="Echeverria">
        <front>
          <title>Establishing Trusted Identities in Disconnected Edge Environments</title>
          <author initials="S." surname="Echeverria" fullname="Sebastian Echeverria">
            <organization/>
          </author>
          <author initials="D." surname="Klinedinst" fullname="Dan Klinedinst">
            <organization/>
          </author>
          <author initials="K." surname="Williams" fullname="Keegan Williams">
            <organization/>
          </author>
          <author initials="G." surname="Lewis" fullname="Grace A. Lewis">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="2016 IEEE/ACM Symposium on Edge Computing" value="(SEC)"/>
        <seriesInfo name="DOI" value="10.1109/sec.2016.27"/>
      </reference>
      <reference anchor="Harchol">
        <front>
          <title>CESSNA: Resilient Edge-Computing</title>
          <author initials="Y." surname="Harchol" fullname="Yotam Harchol">
            <organization/>
          </author>
          <author initials="A." surname="Mushtaq" fullname="Aisha Mushtaq">
            <organization/>
          </author>
          <author initials="J." surname="McCauley" fullname="James McCauley">
            <organization/>
          </author>
          <author initials="A." surname="Panda" fullname="Aurojit Panda">
            <organization/>
          </author>
          <author initials="S." surname="Shenker" fullname="Scott Shenker">
            <organization/>
          </author>
          <date year="2018" month="August"/>
        </front>
        <seriesInfo name="Proceedings of the 2018 Workshop on Mobile Edge" value="Communications"/>
        <seriesInfo name="DOI" value="10.1145/3229556.3229558"/>
      </reference>
      <reference anchor="Anglano">
        <front>
          <title>A game-theoretic approach to coalition formation in fog provider federations</title>
          <author initials="C." surname="Anglano" fullname="Cosimo Anglano">
            <organization/>
          </author>
          <author initials="M." surname="Canonico" fullname="Massimo Canonico">
            <organization/>
          </author>
          <author initials="P." surname="Castagno" fullname="Paolo Castagno">
            <organization/>
          </author>
          <author initials="M." surname="Guazzone" fullname="Marco Guazzone">
            <organization/>
          </author>
          <author initials="M." surname="Sereno" fullname="Matteo Sereno">
            <organization/>
          </author>
          <date year="2018" month="April"/>
        </front>
        <seriesInfo name="2018 Third International Conference on Fog and Mobile Edge Computing" value="(FMEC)"/>
        <seriesInfo name="DOI" value="10.1109/fmec.2018.8364054"/>
      </reference>
      <reference anchor="Jeong">
        <front>
          <title>Towards a distributed computing framework for Fog</title>
          <author initials="T." surname="Jeong" fullname="Taeyeol Jeong">
            <organization/>
          </author>
          <author initials="J." surname="Chung" fullname="Jaeyoon Chung">
            <organization/>
          </author>
          <author initials="J." surname="Hong" fullname="James Won-Ki Hong">
            <organization/>
          </author>
          <author initials="S." surname="Ha" fullname="Sangtae Ha">
            <organization/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <seriesInfo name="2017 IEEE Fog World Congress" value="(FWC)"/>
        <seriesInfo name="DOI" value="10.1109/fwc.2017.8368528"/>
      </reference>
      <reference anchor="Fan">
        <front>
          <title>Cost Aware cloudlet Placement for big data processing at the edge</title>
          <author initials="Q." surname="Fan" fullname="Qiang Fan">
            <organization/>
          </author>
          <author initials="N." surname="Ansari" fullname="Nirwan Ansari">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <seriesInfo name="2017 IEEE International Conference on Communications" value="(ICC)"/>
        <seriesInfo name="DOI" value="10.1109/icc.2017.7996722"/>
      </reference>
      <reference anchor="Yangui">
        <front>
          <title>A platform as-a-service for hybrid cloud/fog environments</title>
          <author initials="S." surname="Yangui" fullname="Sami Yangui">
            <organization/>
          </author>
          <author initials="P." surname="Ravindran" fullname="Pradeep Ravindran">
            <organization/>
          </author>
          <author initials="O." surname="Bibani" fullname="Ons Bibani">
            <organization/>
          </author>
          <author initials="R." surname="Glitho" fullname="Roch H. Glitho">
            <organization/>
          </author>
          <author initials="N." surname="Ben Hadj-Alouane" fullname="Nejib Ben Hadj-Alouane">
            <organization/>
          </author>
          <author initials="M." surname="Morrow" fullname="Monique J. Morrow">
            <organization/>
          </author>
          <author initials="P." surname="Polakos" fullname="Paul A. Polakos">
            <organization/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <seriesInfo name="2016 IEEE International Symposium on Local and Metropolitan Area Networks" value="(LANMAN)"/>
        <seriesInfo name="DOI" value="10.1109/lanman.2016.7548853"/>
      </reference>
      <reference anchor="Li">
        <front>
          <title>MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization</title>
          <author initials="Y." surname="Li" fullname="Yongbo Li">
            <organization/>
          </author>
          <author initials="Y." surname="Chen" fullname="Yurong Chen">
            <organization/>
          </author>
          <author initials="T." surname="Lan" fullname="Tian Lan">
            <organization/>
          </author>
          <author initials="G." surname="Venkataramani" fullname="Guru Venkataramani">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <seriesInfo name="2017 IEEE 37th International Conference on Distributed Computing Systems" value="(ICDCS)"/>
        <seriesInfo name="DOI" value="10.1109/icdcs.2017.54"/>
      </reference>
      <reference anchor="Liu">
        <front>
          <title>Cache Placement in Fog-RANs: From Centralized to Distributed Algorithms</title>
          <author initials="J." surname="Liu" fullname="Juan Liu">
            <organization/>
          </author>
          <author initials="B." surname="Bai" fullname="Bo Bai">
            <organization/>
          </author>
          <author initials="J." surname="Zhang" fullname="Jun Zhang">
            <organization/>
          </author>
          <author initials="K." surname="Letaief" fullname="Khaled B. Letaief">
            <organization/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <seriesInfo name="IEEE Transactions on Wireless Communications" value="vol. 16, no. 11, pp. 7039-7051"/>
        <seriesInfo name="DOI" value="10.1109/twc.2017.2737015"/>
      </reference>
      <reference anchor="Zhang">
        <front>
          <title>Firework: Big Data Sharing and Processing in Collaborative Edge Environment</title>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Zhang" fullname="Xiaohong Zhang">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qingyang Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization/>
          </author>
          <author initials="H." surname="Zhong" fullname="Hong Zhong">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies" value="(HotWeb)"/>
        <seriesInfo name="DOI" value="10.1109/hotweb.2016.12"/>
      </reference>
      <reference anchor="Basudan">
        <front>
          <title>A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing</title>
          <author initials="S." surname="Basudan" fullname="Sultan Basudan">
            <organization/>
          </author>
          <author initials="X." surname="Lin" fullname="Xiaodong Lin">
            <organization/>
          </author>
          <author initials="K." surname="Sankaranarayanan" fullname="Karthik Sankaranarayanan">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 4, no. 3, pp. 772-782"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2666783"/>
      </reference>
      <reference anchor="Renart">
        <front>
          <title>Data-Driven Stream Processing at the Edge</title>
          <author initials="E." surname="Renart" fullname="Eduard Gibert Renart">
            <organization/>
          </author>
          <author initials="J." surname="Diaz-Montes" fullname="Javier Diaz-Montes">
            <organization/>
          </author>
          <author initials="M." surname="Parashar" fullname="Manish Parashar">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <seriesInfo name="2017 IEEE 1st International Conference on Fog and Edge Computing" value="(ICFEC)"/>
        <seriesInfo name="DOI" value="10.1109/icfec.2017.18"/>
      </reference>
      <reference anchor="Zhang2">
        <front>
          <title>Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues</title>
          <author initials="J." surname="Zhang" fullname="Jiale Zhang">
            <organization/>
          </author>
          <author initials="B." surname="Chen" fullname="Bing Chen">
            <organization/>
          </author>
          <author initials="Y." surname="Zhao" fullname="Yanchao Zhao">
            <organization/>
          </author>
          <author initials="X." surname="Cheng" fullname="Xiang Cheng">
            <organization/>
          </author>
          <author initials="F." surname="Hu" fullname="Feng Hu">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
        <seriesInfo name="IEEE Access" value="vol. 6, pp. 18209-18237"/>
        <seriesInfo name="DOI" value="10.1109/access.2018.2820162"/>
      </reference>
      <reference anchor="Yates">
        <front>
          <title>The Age of Information: Real-Time Status Updating by Multiple Sources</title>
          <author initials="R." surname="Yates" fullname="Roy D. Yates">
            <organization/>
          </author>
          <author initials="S." surname="Kaul" fullname="Sanjit K. Kaul">
            <organization/>
          </author>
          <date year="2019" month="March"/>
        </front>
        <seriesInfo name="IEEE Transactions on Information Theory" value="vol. 65, no. 3, pp. 1807-1827"/>
        <seriesInfo name="DOI" value="10.1109/tit.2018.2871079"/>
      </reference>
      <reference anchor="Khan">
        <front>
          <title>Edge-Computing-Enabled Smart Cities: A Comprehensive Survey</title>
          <author initials="L." surname="Khan" fullname="Latif U. Khan">
            <organization/>
          </author>
          <author initials="I." surname="Yaqoob" fullname="Ibrar Yaqoob">
            <organization/>
          </author>
          <author initials="N." surname="Tran" fullname="Nguyen H. Tran">
            <organization/>
          </author>
          <author initials="S." surname="Kazmi" fullname="S. M. Ahsan Kazmi">
            <organization/>
          </author>
          <author initials="T." surname="Dang" fullname="Tri Nguyen Dang">
            <organization/>
          </author>
          <author initials="C." surname="Hong" fullname="Choong Seon Hong">
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 7, no. 10, pp. 10200-10232"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2020.2987070"/>
      </reference>
      <reference anchor="RFC7390" target="https://www.rfc-editor.org/info/rfc7390">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <author fullname="A. Rahman" initials="A." role="editor" surname="Rahman">
            <organization/>
          </author>
          <author fullname="E. Dijk" initials="E." role="editor" surname="Dijk">
            <organization/>
          </author>
          <date month="October" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for constrained devices and constrained networks. It is anticipated that constrained devices will often naturally operate in groups (e.g., in a building automation scenario, all lights in a given room may need to be switched on/off as a group). This specification defines how CoAP should be used in a group communication context.  An approach for using CoAP on top of IP multicast is detailed based on existing CoAP functionality as well as new features introduced in this specification.  Also, various use cases and corresponding protocol flows are provided to illustrate important concepts.  Finally, guidance is provided for deployment in various network topologies.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7390"/>
        <seriesInfo name="DOI" value="10.17487/RFC7390"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-groupcomm" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-groupcomm-14.txt">
        <front>
          <title>Group OSCORE - Secure Group Communication for CoAP</title>
          <author fullname="Marco Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Göran Selander">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Francesca Palombini">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="John Preuss Mattsson">
            <organization>Ericsson AB</organization>
          </author>
          <author fullname="Jiye Park">
            <organization>Universitaet Duisburg-Essen</organization>
          </author>
          <date day="7" month="March" year="2022"/>
          <abstract>
            <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-14"/>
      </reference>
      <reference anchor="Murshed">
        <front>
          <title>Machine Learning at the Network Edge: A Survey</title>
          <author initials="M." surname="Murshed" fullname="M. G. Sarwar Murshed">
            <organization/>
          </author>
          <author initials="C." surname="Murphy" fullname="Christopher Murphy">
            <organization/>
          </author>
          <author initials="D." surname="Hou" fullname="Daqing Hou">
            <organization/>
          </author>
          <author initials="N." surname="Khan" fullname="Nazar Khan">
            <organization/>
          </author>
          <author initials="G." surname="Ananthanarayanan" fullname="Ganesh Ananthanarayanan">
            <organization/>
          </author>
          <author initials="F." surname="Hussain" fullname="Faraz Hussain">
            <organization/>
          </author>
          <date year="2022" month="November"/>
        </front>
        <seriesInfo name="ACM Computing Surveys" value="vol. 54, no. 8, pp. 1-37"/>
        <seriesInfo name="DOI" value="10.1145/3469029"/>
      </reference>
      <reference anchor="I-D.sarathchandra-coin-appcentres" target="https://www.ietf.org/archive/id/draft-sarathchandra-coin-appcentres-04.txt">
        <front>
          <title>In-Network Computing for App-Centric Micro-Services</title>
          <author fullname="Dirk Trossen">
            <organization>Huawei</organization>
          </author>
          <author fullname="Chathura Sarathchandra">
            <organization>InterDigital Inc.</organization>
          </author>
          <author fullname="Michael Boniface">
            <organization>University of Southampton</organization>
          </author>
          <date day="26" month="January" year="2021"/>
          <abstract>
            <t>   The application-centric deployment of 'Internet' services has
   increased over the past ten years with many millions of applications
   providing user-centric services, executed on increasingly more
   powerful smartphones that are supported by Internet-based cloud
   services in distributed data centres, the latter mainly provided by
   large scale players such as Google, Amazon and alike. This draft
   outlines a vision for evolving those data centres towards executing
   app-centric micro-services; we dub this evolved data centre as an
   AppCentre. Complemented with the proliferation of such AppCentres at
   the edge of the network, they will allow for such micro-services to
   be distributed across many places of execution, including mobile
   terminals themselves, while specific micro-service chains equal
   today's applications in existing smartphones.

   We outline the key enabling technologies that needs to be provided
   for such evolution to be realized, including references to ongoing
   standardization efforts in key areas.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-sarathchandra-coin-appcentres-04"/>
      </reference>
      <reference anchor="I-D.defoy-t2trg-iot-edge-computing-background" target="https://www.ietf.org/archive/id/draft-defoy-t2trg-iot-edge-computing-background-00.txt">
        <front>
          <title>IoT Edge Computing: Initiatives, Projects and Products</title>
          <author fullname="Xavier de Foy">
            <organization>InterDigital Communications</organization>
          </author>
          <author fullname="Jungha Hong">
            <organization>ETRI</organization>
          </author>
          <author fullname="Yong-Geun Hong">
            <organization>ETRI</organization>
          </author>
          <author fullname="Matthias Kovatsch">
            <organization>Huawei Technologies Duesseldorf GmbH</organization>
          </author>
          <author fullname="Eve Schooler">
            <organization>Intel</organization>
          </author>
          <author fullname="Dirk Kutscher">
            <organization>University of Applied Sciences Emden/Leer</organization>
          </author>
          <date day="25" month="May" year="2020"/>
          <abstract>
            <t>   Many IoT applications have requirements that cannot be met by
   the traditional Cloud.  As a result, the IoT is driving the Internet
   toward Edge computing.  This draft reviews initiatives, projects and
   products related to IoT Edge Computing.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-defoy-t2trg-iot-edge-computing-background-00"/>
      </reference>
      <reference anchor="Senel">
        <front>
          <title>EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud</title>
          <author initials="B." surname="Senel" fullname="Berat Can Senel">
            <organization/>
          </author>
          <author initials="M." surname="Mouchet" fullname="Maxime Mouchet">
            <organization/>
          </author>
          <author initials="J." surname="Cappos" fullname="Justin Cappos">
            <organization/>
          </author>
          <author initials="O." surname="Fourmaux" fullname="Olivier Fourmaux">
            <organization/>
          </author>
          <author initials="T." surname="Friedman" fullname="Timur Friedman">
            <organization/>
          </author>
          <author initials="R." surname="McGeer" fullname="Rick McGeer">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459737"/>
      </reference>
      <reference anchor="Stanciu">
        <front>
          <title>Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption</title>
          <author initials="V." surname="Stanciu" fullname="Valeriu-Daniel Stanciu">
            <organization/>
          </author>
          <author initials="M." surname="Steen" fullname="Maarten van Steen">
            <organization/>
          </author>
          <author initials="C." surname="Dobre" fullname="Ciprian Dobre">
            <organization/>
          </author>
          <author initials="A." surname="Peter" fullname="Andreas Peter">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459735"/>
      </reference>
      <reference anchor="Jeffery">
        <front>
          <title>Rearchitecting Kubernetes for the Edge</title>
          <author initials="A." surname="Jeffery" fullname="Andrew Jeffery">
            <organization/>
          </author>
          <author initials="H." surname="Howard" fullname="Heidi Howard">
            <organization/>
          </author>
          <author initials="R." surname="Mortier" fullname="Richard Mortier">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459730"/>
      </reference>
      <reference anchor="Nieke">
        <front>
          <title>Edgedancer: Secure Mobile WebAssembly Services on the Edge</title>
          <author initials="M." surname="Nieke" fullname="Manuel Nieke">
            <organization/>
          </author>
          <author initials="L." surname="Almstedt" fullname="Lennart Almstedt">
            <organization/>
          </author>
          <author initials="R." surname="Kapitza" fullname="Rüdiger Kapitza">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459731"/>
      </reference>
      <reference anchor="Cao">
        <front>
          <title>eCaaS: A Management Framework of Edge Container as a Service for Business Workload</title>
          <author initials="L." surname="Cao" fullname="Lianjie Cao">
            <organization/>
          </author>
          <author initials="A." surname="Merican" fullname="Anu Merican">
            <organization/>
          </author>
          <author initials="D." surname="Tootaghaj" fullname="Diman Zad Tootaghaj">
            <organization/>
          </author>
          <author initials="F." surname="Ahmed" fullname="Faraz Ahmed">
            <organization/>
          </author>
          <author initials="P." surname="Sharma" fullname="Puneet Sharma">
            <organization/>
          </author>
          <author initials="V." surname="Saxena" fullname="Vinay Saxena">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459741"/>
      </reference>
      <reference anchor="Larrea">
        <front>
          <title>The serverkernel operating system</title>
          <author initials="J." surname="Larrea" fullname="Jon Larrea">
            <organization/>
          </author>
          <author initials="A." surname="Barbalace" fullname="Antonio Barbalace">
            <organization/>
          </author>
          <date year="2020" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3378679.3394537"/>
      </reference>
      <reference anchor="Mortazavi" target="https://www.usenix.org/conference/hotedge18/presentation/mortazavi">
        <front>
          <title>Toward Session Consistency for the Edge</title>
          <author initials="S." surname="Hossein Mortazavi">
            <organization/>
          </author>
          <author initials="B." surname="Balasubramanian">
            <organization/>
          </author>
          <author initials="E." surname="de Lara">
            <organization/>
          </author>
          <author initials="S. P." surname="Narayanan">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
        <refcontent>USENIX, Workshop on Hot Topics in Edge Computing (HotEdge 18)</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0001" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=28153">
        <front>
          <title>TR 0001, Use Cases Collection</title>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2018" month="October"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0018" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29334">
        <front>
          <title>TR 0018, Industrial Domain Enablement</title>
          <author initials="C." surname="Lu">
            <organization/>
          </author>
          <author initials="M." surname="Jiang">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0026" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=31410">
        <front>
          <title>TR 0026, Vehicular Domain Enablement</title>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <author initials="V." surname="Kueh">
            <organization/>
          </author>
          <date year="2020" month="January"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0052" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=32633">
        <front>
          <title>TR 0052, Study on Edge and Fog Computing in oneM2M systems</title>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2020" month="September"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TS0002" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29274">
        <front>
          <title>TS 0002, Requirements</title>
          <author initials="S." surname="He">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="Chen">
        <front>
          <title>Edge Computing in IoT-Based Manufacturing</title>
          <author initials="B." surname="Chen" fullname="Baotong Chen">
            <organization/>
          </author>
          <author initials="J." surname="Wan" fullname="Jiafu Wan">
            <organization/>
          </author>
          <author initials="A." surname="Celesti" fullname="Antonio Celesti">
            <organization/>
          </author>
          <author initials="D." surname="Li" fullname="Di Li">
            <organization/>
          </author>
          <author initials="H." surname="Abbas" fullname="Haider Abbas">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qin Zhang">
            <organization/>
          </author>
          <date year="2018" month="September"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="vol. 56, no. 9, pp. 103-109"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2018.1701231"/>
      </reference>
      <reference anchor="Jones">
        <front>
          <title>Characterising the Digital Twin: A systematic literature review</title>
          <author initials="D." surname="Jones" fullname="David Jones">
            <organization/>
          </author>
          <author initials="C." surname="Snider" fullname="Chris Snider">
            <organization/>
          </author>
          <author initials="A." surname="Nassehi" fullname="Aydin Nassehi">
            <organization/>
          </author>
          <author initials="J." surname="Yon" fullname="Jason Yon">
            <organization/>
          </author>
          <author initials="B." surname="Hicks" fullname="Ben Hicks">
            <organization/>
          </author>
          <date year="2020" month="May"/>
        </front>
        <seriesInfo name="CIRP Journal of Manufacturing Science and Technology" value="vol. 29, pp. 36-52"/>
        <seriesInfo name="DOI" value="10.1016/j.cirpj.2020.02.002"/>
      </reference>
      <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby">
            <organization/>
          </author>
          <author fullname="K. Hartke" initials="K." surname="Hartke">
            <organization/>
          </author>
          <author fullname="C. Bormann" initials="C." surname="Bormann">
            <organization/>
          </author>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="Cloudlets">
        <front>
          <title>The Case for VM-Based Cloudlets in Mobile Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="M. Satyanarayanan">
            <organization/>
          </author>
          <author initials="P." surname="Bahl" fullname="P. Bahl">
            <organization/>
          </author>
          <author initials="R." surname="Caceres" fullname="R. Caceres">
            <organization/>
          </author>
          <author initials="N." surname="Davies" fullname="N. Davies">
            <organization/>
          </author>
          <date year="2009" month="October"/>
        </front>
        <seriesInfo name="IEEE Pervasive Computing" value="vol. 8, no. 4, pp. 14-23"/>
        <seriesInfo name="DOI" value="10.1109/mprv.2009.82"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
