<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.19 (Ruby 3.0.2) -->
<?rfc iprnotified="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc colonspace="yes"?>
<?rfc rfcedstyle="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-iot-edge-08" category="info" submissionType="IRTF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="IoT Edge Computing">IoT Edge Challenges and Functions</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-iot-edge-08"/>
    <author initials="J." surname="Hong" fullname="Jungha Hong">
      <organization>ETRI</organization>
      <address>
        <postal>
          <street>218 Gajeong-ro, Yuseung-Gu</street>
          <city>Daejeon</city>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <email>jhong@etri.re.kr</email>
      </address>
    </author>
    <author initials="Y.-G." surname="Hong" fullname="Yong-Geun Hong">
      <organization>Daejeon University</organization>
      <address>
        <postal>
          <street>62 Daehak-ro, Dong-gu</street>
          <city>Daejeon</city>
          <code>300716</code>
          <country>Republic of Korea</country>
        </postal>
        <email>yonggeun.hong@gmail.com</email>
      </address>
    </author>
    <author initials="X." surname="de Foy" fullname="Xavier de Foy">
      <organization>InterDigital Communications, LLC</organization>
      <address>
        <postal>
          <street>1000 Sherbrooke West</street>
          <city>Montreal</city>
          <code>H3A 3G4</code>
          <country>Canada</country>
        </postal>
        <email>xavier.defoy@interdigital.com</email>
      </address>
    </author>
    <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
      <organization>Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25 C // 3.OG</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>ietf@kovatsch.net</email>
      </address>
    </author>
    <author initials="E." surname="Schooler" fullname="Eve Schooler">
      <organization>Intel</organization>
      <address>
        <postal>
          <street>2200 Mission College Blvd.</street>
          <city>Santa Clara, CA</city>
          <code>95054-1537</code>
          <country>USA</country>
        </postal>
        <email>eve.m.schooler@intel.com</email>
      </address>
    </author>
    <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
      <organization>University of Applied Sciences Emden/Leer</organization>
      <address>
        <postal>
          <street>Constantiaplatz 4</street>
          <city>Emden</city>
          <code>26723</code>
          <country>Germany</country>
        </postal>
        <email>ietf@dkutscher.net</email>
      </address>
    </author>
    <date year="2023" month="January" day="17"/>
    <area>T2TRG</area>
    <abstract>
      <t>Many IoT applications have requirements that cannot be met by the traditional Cloud (aka cloud computing). These include time sensitivity, data volume, connectivity cost, operation in the face of intermittent services, privacy, and security. As a result, the IoT is driving the Internet toward Edge computing. This document outlines the requirements of the emerging IoT Edge and its challenges. It presents a general model, and major components of the IoT Edge, to provide a common base for future discussions in T2TRG and other IRTF and IETF groups.
This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Currently, many IoT services leverage the Cloud, since it can provide virtually unlimited storage and processing power.
The reliance of IoT on back-end cloud computing brings additional advantages such as flexibility and efficiency.
Today's IoT systems are fairly static with respect to integrating and supporting computation.
It's not that there is no computation, but systems are often limited to static configurations (edge gateways, cloud services).</t>
      <t>However, IoT devices are creating vast amounts of data at the network edge. To meet IoT use case requirements, that data increasingly is being stored, processed, analyzed, and acted upon close to the data producers.
These requirements include time sensitivity, data volume, connectivity cost, resiliency in the face of intermittent connectivity, privacy, and security, which cannot be addressed by today's centralized cloud computing.
These requirements suggest a more flexible way to distribute computing (and storage) and to integrate it in the edge-cloud continuum.
We will refer to this integration of edge computing and IoT as "IoT edge computing".
Our draft describes related background, uses cases, challenges, system models, and functional components.</t>
      <t>Due to the dynamic nature of the IoT edge computing landscape, this document does not list existing projects in this field. However, <xref target="sec-overview"/> presents a high-level overview of the field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background"/>.</t>
      <t>This document represents the consensus of the Thing-to-Thing Research Group (T2TRG).
It has been reviewed extensively by the Research Group (RG) members who are actively
involved in the research and development of the technology covered by this document.
It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="background">
      <name>Background</name>
      <section anchor="internet-of-things-iot">
        <name>Internet of Things (IoT)</name>
        <t>Since the term "Internet of Things" (IoT) was coined by Kevin Ashton in 1999 working on Radio-Frequency Identification (RFID) technology <xref target="Ashton"/>,
the concept of IoT has evolved. It now reflects a vision of connecting the physical world to the virtual world of computers using (wireless) networks over which things can send and receive information without human intervention.
Recently, the term has become more literal by actually connecting things to the Internet and converging on Internet and Web technology.</t>
        <t>A Thing is a physical item that is made available in the Internet of 
Things, thereby enabling digital interaction with the physical 
world for humans, services, and/or other Things (<xref target="I-D.irtf-t2trg-rest-iot"/>). 
In this document we will use the term "IoT device" to designate the embedded system attached to the Thing.</t>
        <t>Things are not necessarily constrained. 
Resource-constrained Things such as sensors, home appliances and wearable devices 
have limited storage and processing power, which raise concerns regarding reliability, performance, 
energy consumption, security, and privacy <xref target="Lin"/>.
However, more generally Things, constrained or not, tend to generate a voluminous amount of data.
This range of factors led to complementing IoT with cloud computing, at least initially.</t>
      </section>
      <section anchor="cloud-computing">
        <name>Cloud Computing</name>
        <t>Cloud computing has been defined in <xref target="NIST"/>: "cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction".
Low cost and massive availability of storage and processing power enabled the realization of another computing model, in which virtualized resources can be leased in an on-demand fashion, being provided as general utilities.
Companies like Amazon, Google, Facebook, etc. widely adopted this paradigm for delivering services over the Internet, gaining both economical and technical benefits <xref target="Botta"/>.</t>
        <t>Today, an unprecedented volume and variety of data is generated by things, and applications deployed at the network edge consume this data.
In this context, cloud-based service models are not suitable for some classes of applications, which for example need very short response times, access to local personal data, or generate vast amounts of data.
Those applications may instead leverage edge computing.</t>
      </section>
      <section anchor="edge-computing">
        <name>Edge Computing</name>
        <t>Edge computing, also referred to as fog computing in some settings, is a new paradigm in which substantial computing and storage resources are placed at the edge of the Internet, that is, close to mobile devices, sensors, actuators, or machines.
Edge computing happens near data sources <xref target="Mahadev"/>, or closer (topologically, physically, in terms of latency, etc.) to where decisions or interactions with the physical world are happening.
It processes both downstream data, e.g. originated from cloud services, and upstream data, e.g. originated from end devices or network elements.
The term fog computing usually represents the notion of a multi-tiered edge computing, that is, several layers of compute infrastructure between the end devices and cloud services.</t>
        <t>An edge device is any computing or networking resource residing between end-devices' data sources and cloud-based data centers.
In edge computing, end devices not only consume data but also produce data.
And at the network edge, devices not only request services and information from the Cloud, but also handle computing tasks including processing, storage, caching, and load balancing on data sent to and from the Cloud <xref target="Shi"/>.
This does not preclude end devices from hosting computation themselves when possible, independently or as part of a distributed edge computing platform (this is also referred to as Mist Computing).</t>
        <t>Several standards developing organization (SDO) and industry forums have provided definitions of edge and fog computing:</t>
        <ul spacing="normal">
          <li>ISO defines edge computing as a "form of distributed computing in which significant processing and data storage takes place on nodes which are at the edge of the network" <xref target="ISO_TR"/>.</li>
          <li>ETSI defines multi-access edge computing as a "system which provides an IT service environment and cloud-computing capabilities at the edge of an access network which contains one or more type of access technology, and in close proximity to its users" <xref target="ETSI_MEC_01"/>.</li>
          <li>The Industry IoT Consortium (IIC, now incorporating what was formerly OpenFog) defines fog computing as "a horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum" <xref target="OpenFog"/>.</li>
        </ul>
        <t>Based on these definitions, we can summarize a general philosophy of edge computing as to distribute the required functions close to users and data, while the difference to classic local systems is the usage of management and orchestration features adopted from cloud computing.</t>
        <t>Actors from various industries approach edge computing using different terms and reference models, although in practice these approaches are not incompatible and may integrate with each other:</t>
        <ul spacing="normal">
          <li>The telecommunication industry tends to use a model where edge computing services are deployed over Network Function Virtualization (NFV) infrastructure, at aggregation points or in proximity to the user equipment (e.g., gNodeBs) <xref target="ETSI_MEC_03"/>.</li>
          <li>Enterprise and campus solutions often interpret edge computing as an "edge cloud", that is, a smaller data center directly connected to the local network (often referred to as "on-premise").</li>
          <li>The automation industry defines the edge as the connection point between IT from OT (Operational Technology). Hence, here edge computing sometimes refers to applying IT solutions to OT problems such as analytics, more flexible user interfaces, or simply having more computing power than an automation controller.</li>
        </ul>
      </section>
      <section anchor="sec-uc">
        <name>Examples of IoT Edge Computing Use Cases</name>
        <t>IoT edge computing can be used in home, industry, grid, healthcare, city, transportation, agriculture, and/or education scenarios.
We discuss here only a few examples of such use cases, to point out differentiating requirements.
These examples are followed with references to other use cases.</t>
        <t><strong>Smart Factory</strong></t>
        <t>As part of the 4th industrial revolution, smart factories run real-time processes based on IT technologies such as artificial intelligence and big data. In a smart factory, even a very small environmental change can lead to a situation in which production efficiency decreases or product quality problems occur. Therefore, simple but time-sensitive processing can be performed at the edge: for example, controlling temperature and humidity in the factory, or operating machines based on the real-time collection of the operational status of each machine. On the other hand, data requiring highly precise analysis, such as machine lifecycle management or accident risk prediction, can be transferred to a central data center for processing.</t>
        <t>The use of edge computing in a smart factory can reduce the cost of network and storage resources by reducing the communication load to the central data center or server. It is also possible to improve process efficiency and facility asset productivity through the real-time prediction of failures, and to reduce the cost of failure through preliminary measures. In the existing manufacturing field, production facilities are manually run according to a program entered in advance, but edge computing in a smart factory enables tailoring solutions by analyzing data at each production facility and machine level. Digital twins <xref target="Jones"/> of IoT devices have been used jointly with edge computing in industrial IoT scenarios <xref target="Chen"/>.</t>
        <t><strong>Smart Grid</strong></t>
        <t>In future smart city scenarios, the Smart Grid will be critical in ensuring highly available/efficient energy control in city-wide electricity management.
Edge computing is expected to play a significant role in those systems to improve transmission efficiency of electricity; to react to, and restore power after, a disturbance; to reduce operation costs and reuse renewable energy effectively, since these operations involve local decision-making. In addition, edge computing can help to monitor power generation and power demand, and making local electrical energy storage decisions in the smart grid system.</t>
        <t><strong>Smart Agriculture</strong></t>
        <t>Smart agriculture integrates information and communication technology with farming technology. Intelligent farms use IoT technology to measure and analyze temperature, humidity, sunlight, carbon dioxide, soil, etc. in crop cultivation facilities. Depending on analysis results, control devices are used to set environmental parameters to an appropriate state. Remote management is also possible through mobile devices such as smartphones.</t>
        <t>In existing farms, simple systems such as management according to temperature and humidity can easily and inexpensively be implemented with IoT technology. Sensors in fields are gathering data on field and crop condition. This data is then transmitted to cloud servers, which process data and recommend actions. Usage of edge computing can reduce by a large amount data transmitted up and down the network, resulting in saving cost and bandwidth. Locally generated data can be processed at the edge, and local computing and analytics can drive local actions. With edge computing, it is also easy for farmers to select large amounts of data for processing, and data can be analyzed even in remote areas with poor access conditions. As the number of people working on farming decreases over time, increasing automation enabled by edge computing can be a driving force for future smart agriculture.</t>
        <t><strong>Smart Construction</strong></t>
        <t>Safety is critical on a construction site. Every year, many construction workers lose their lives due to falls, collisions, electric shocks, and other accidents.
Therefore, solutions have been developed in order to improve construction site safety, including real-time identification of workers, monitoring of equipment location, and predictive accident prevention. To deploy these solutions, many cameras and IoT sensors were installed on construction sites, measuring noise, vibration, gas concentration, etc. Typically, data generated from these measurements has been collected in an on-site gateway and sent to a remote cloud server for storage and analysis. Thus, an inspector can check the information stored on the cloud server to investigate an incident. However, this approach can be expensive, due to transmission costs, e.g., of video streams over an LTE connection, and due to usage fees of private cloud services such as Amazon Web Services.</t>
        <t>Using edge computing, data generated on the construction site can be processed and analyzed on an edge server located within or near the site. Only the result of this processing needs to be transferred to a cloud server, thus saving transmission costs. It is also possible to locally generate warnings to prevent accident in real-time.</t>
        <t><strong>Self-Driving Car</strong></t>
        <t>The self-driving car, with its focus on safety, is a system where edge computing has an essential role. Autonomous vehicles are equipped with high-resolution cameras, radars, laser scanners (LIDAR), sonar sensors, and GPS systems. Edge computing nodes collect and analyze vast amounts of data generated in real-time by these sensors to keep track of distances between vehicles in front, surrounding road conditions, vehicle flow, and to quickly respond to unexpected situations. For example, if the speed of the car running in front decreases, speed should be adjusted to maintain the distance between the cars, and when a roadside signal changes, a self-driving car should operate according to the new signal. If such processing is performed in a central data center, network delays or data transmission errors can lead to accidents. Applying edge computing can minimize these network delays and data transmission errors, thereby improving safety. In the shorter term we can expect edge computing nodes to be at the base station or in road-side units. However, to further reduce reaction times, some edge computing nodes should be located in the vehicle itself.</t>
        <t><strong>AR/VR</strong></t>
        <t>Augmented Reality (AR) and Virtual Reality (VR) are likely to strongly influence the Information and Communication Technology (ICT) market in the future, since they can support innovative products in most other use cases including smart factories, self-driving cars, etc. In AR/VR, due to large amounts of data generated at endpoints such as mobile devices and PCs, user immersion can be significantly decreased by a latency of only a few hundred milliseconds. Therefore, using an edge computing infrastructure built close to endpoints can not only reduce the cost and latency of data transmission but also maximize user immersion. For example, in AR using edge computing, streaming video can be displayed realistically in higher quality, giving users the best possible experience.</t>
        <t><strong>Other Use Cases</strong></t>
        <t>oneM2M recently studied several use cases related to edge computing, including: smart factories, smart transportation, an accident notification service, a high-precision road map service, a vulnerable road user service and a vehicular data service. These use cases are documented in <xref target="oneM2M-TR0001"/>, <xref target="oneM2M-TR0018"/> and <xref target="oneM2M-TR0026"/>. Edge computing related requirements raised through the analysis of these use cases are captured in <xref target="oneM2M-TS0002"/>.</t>
      </section>
    </section>
    <section anchor="sec-challenges">
      <name>IoT Challenges Leading Towards Edge Computing</name>
      <t>This section describes challenges met by IoT, that are motivating the adoption of edge computing for IoT. Those are distinct from research challenges applicable to IoT edge computing, some of which will be mentioned in <xref target="sec-components"/>.</t>
      <t>IoT technology is used with more and more demanding applications, e.g. in industrial, automotive or healthcare domains, leading to new challenges.
For example, industrial machines such as laser cutters already produce over 1 terabyte per hour, and similar amounts can be generated in autonomous cars <xref target="NVIDIA"/>.
90% of IoT data is expected to be stored, processed, analyzed, and acted upon close to the source <xref target="Kelly"/>, as cloud computing models alone cannot address the new challenges <xref target="Chiang"/>.</t>
      <t>Below we discuss IoT use case requirements that are moving cloud capabilities to be more proximate and more distributed and disaggregated.</t>
      <section anchor="time-sensitivity">
        <name>Time Sensitivity</name>
        <t>Many industrial control systems, such as manufacturing systems, smart grids, oil and gas systems, etc., often require stringent end-to-end latency between the sensor and control node.
While some IoT applications may require latency below a few tens of milliseconds <xref target="Weiner"/>,
industrial robots and motion control systems have use cases for cycle times in the order of microseconds <xref target="_60802"/>.
In some cases speed-of-light limitations may simply prevent a solution based on remote cloud, however it is not the only challenge relative to time sensitivity.
Guarantees for bounded latency and jitter (<xref target="RFC8578"/> section 7) are also important to those industrial IoT applications.
This means control packets need to arrive with as little variation as possible and within a strict deadline.
Given the best-effort characteristics of the Internet, this challenge is virtually impossible to address, without using end-to-end guarantees for individual message delivery and continuous data flows.</t>
      </section>
      <section anchor="connectivity-cost">
        <name>Connectivity Cost</name>
        <t>Some IoT deployments are not challenged by a constrained network bandwidth to the Cloud.
The fifth generation mobile networks (5G) and Wi-Fi 6 both theoretically top out at 10 gigabits per second (i.e., 4.5 terabytes per hour), which enables high-bandwidth uplinks.
However, the resulting cost for high-bandwidth connectivity to upload all data to the Cloud is unjustifiable and impractical for most IoT applications.
In some settings, e.g. in aeronautical communication, higher communication costs reduce the amount of data that can be practically uploaded even further.</t>
      </section>
      <section anchor="resilience-to-intermittent-services">
        <name>Resilience to Intermittent Services</name>
        <t>Many IoT devices such as sensors, data collectors, actuators, controllers, etc. have very limited hardware resources
and cannot rely solely on their limited resources to meet all their computing and/or storage needs.
They require reliable, uninterrupted, or resilient services to augment their capabilities in order to fulfill their application tasks.
This is hard and partly impossible to achieve with cloud services for systems such as vehicles, drones, or oil rigs that have intermittent network connectivity.
The dual is also true, a cloud back-end might want to have a reading of the device even if it's currently asleep.</t>
      </section>
      <section anchor="sec-priv">
        <name>Privacy and Security</name>
        <t>When IoT services are deployed at home, personal information can be learned from detected usage data.
For example, one can extract information about employment, family status, age, and income by analyzing smart meter data <xref target="ENERGY"/>.
Policy-makers started to provide frameworks that limit the usage of personal data and put strict requirements on data controllers and processors.
Data stored indefinitely in the Cloud also increases the risk of data leakage, for instance, through attacks on rich targets.</t>
        <t>Industrial systems are often argued to not have privacy implications, as no personal data is gathered.
Yet data from such systems is often highly sensitive, as one might be able to infer trade secrets such as the setup of production lines.
Hence, the owners of these systems are generally reluctant to upload IoT data to the Cloud.</t>
        <t>Furthermore, passive observers can perform traffic analysis on the device-to-cloud path.
Hiding traffic patterns associated with sensor networks can therefore be another requirement for edge computing.</t>
      </section>
    </section>
    <section anchor="iot-edge-computing-functions">
      <name>IoT Edge Computing Functions</name>
      <t>In this section, we first look at the current state of IoT edge computing (<xref target="sec-overview"/>), and then define a general system model (<xref target="sec-model"/>). This provides context for IoT edge computing functions, which are listed in <xref target="sec-components"/>.</t>
      <section anchor="sec-overview">
        <name>Overview of IoT Edge Computing Today</name>
        <t>This section provides an overview of today's IoT edge computing field, based on a limited review of standards, research, open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background"/>.</t>
        <t>IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) and proprietary (such as Amazon Greengrass, Microsoft Azure IoT Edge, Google Cloud IoT Core, and gateways from Bosch, Siemens), represent a common class of IoT edge computing products, where the gateway is providing a local service on customer premises and is remotely managed through a cloud service. IoT communication protocols are typically used between IoT devices and the gateway, including CoAP, MQTT, and many specialized IoT protocols (such as OPC UA and DDS in the Industrial IoT space), while the gateway communicates with the distant cloud typically using HTTPS. Virtualization platforms enable the deployment of virtual edge computing functions (using VMs, application containers, etc.), including IoT gateway software, on servers in the mobile network infrastructure (at base stations and concentration points), in edge data centers (in central offices) or regional data centers located near central offices. End devices are envisioned to become computing devices in forward-looking projects, but they are not commonly used as such today.</t>
        <t>Besides open-source and proprietary solutions, a horizontal IoT service layer is standardized by the oneM2M standards body, to reduce fragmentation, increase interoperability and promote reuse in the IoT ecosystem.</t>
        <t>Physical or virtual IoT gateways can host application programs, which are typically built using an SDK to access local services through a programmatic API.
Edge cloud system operators host their customers' application VMs or containers on servers located in or near access networks, which can implement local edge services. For example, mobile networks can provide edge services for radio network information, location, and bandwidth management.</t>
        <t>Resilience in IoT often entails the ability to operate autonomously in periods of disconnectedness in order to preserve the integrity and safety of the controlled system, possibly in a degraded mode. IoT devices and gateways are often expected to operate in the always-on and unattended mode, using fault detection and unassisted recovery functions.</t>
        <t>Life cycle management of services and applications on physical IoT gateways is often cloud-based.
Edge cloud management platforms and products (such as StarlingX, Akraino Edge Stack, Mobile EdgeX) adapt cloud management technologies (e.g., Kubernetes) to the edge cloud, i.e., to smaller, distributed computing devices running outside a controlled data center. Service and application life-cycle is typically using an NFV-like management and orchestration model.</t>
        <t>The platform typically enables advertising or consuming services hosted on the platform (e.g., Mp1 interface in ETSI MEC supports service discovery and communication), and enables communicating with local and remote endpoints (e.g., message routing function in IoT gateways).  The platform is typically extensible by edge applications, since they can advertise a service that other edge applications can consume. IoT communication services include protocols translation, analytics, and transcoding.  Communication between edge computing devices is enabled in tiered deployments or distributed deployments.</t>
        <t>An edge cloud platform may enable pass-through without storage or local storage (e.g., on IoT gateways). Some edge cloud platforms use a distributed form of storage such as an ICN network, e.g., Named Function Networking (NFN) nodes can store data in a Named Data Networking (NDN) system, or a distributed storage platform (e.g., IPFS, EdgeFS, Ceph). External storage, e.g., on databases in distant or local IT cloud, is typically used for filtered data deemed worthy of long-term storage, although in some cases it may be for all data, for example when required for regulatory reasons.</t>
        <t>Stateful computing is supported on platforms hosting native programs, VMs or containers. Stateless computing is supported on platforms providing a "serverless computing" service (a.k.a. function-as-a-service, e.g., using stateless containers), or on systems based on named function networking.</t>
        <t>In many IoT use cases, a typical network usage pattern is high volume uplink with some form of traffic reduction enabled by processing over edge computing devices. Alternatives to traffic reduction include deferred transmission (to off-peak hours or using physical shipping). Downlink traffic includes application control and software updates. Other, downlink-heavy traffic patterns are not excluded but are more often associated with non-IoT usage (e.g., video CDNs).</t>
      </section>
      <section anchor="sec-model">
        <name>General Model</name>
        <t>Edge computing is expected to play an important role in deploying new IoT services integrated with Big Data and AI, enabled by flexible in-network computing platforms. Although there are lots of approaches to edge computing, we attempt to lay out a general model and list associated logical functions in this section. In practice, this model can map to different architectures, such as:</t>
        <ul spacing="normal">
          <li>A single IoT gateway, or a hierarchy of IoT gateways, typically connected to the cloud (e.g., to extend the traditional cloud-based management of IoT devices and data to the edge). A common role of an IoT Gateway is to provide access to a heterogeneous set of IoT devices/sensors; handle IoT data; and deliver IoT data to its final destination in a cloud network. Whereas an IoT gateway needs interactions with the cloud, it can also operate independently in a disconnected mode.</li>
          <li>A set of distributed computing nodes, e.g., embedded in switches, routers, edge cloud servers, or mobile devices. Some IoT devices can have enough computing capabilities to participate in such distributed systems due to advances in hardware technology. In this model, edge computing nodes can collaborate to share their resources.</li>
        </ul>
        <t>In the general model described in <xref target="rl-fig1"/>, the edge computing domain is interconnected with IoT devices (southbound connectivity) and possibly with a remote/cloud network (northbound connectivity), and with a service operator's system.
Edge computing nodes provide multiple logical functions, or components, which may not all be present in a given system. They may be implemented in a centralized or distributed fashion, at the network edge, or through some interworking between edge network and remote cloud network.</t>
        <figure anchor="rl-fig1">
          <name>Model of IoT Edge Computing</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="672" width="392" viewBox="0 0 392 672" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,128 L 8,544" fill="none" stroke="black"/>
                <path d="M 24,592 L 24,640" fill="none" stroke="black"/>
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 64,544 L 64,592" fill="none" stroke="black"/>
                <path d="M 96,592 L 96,640" fill="none" stroke="black"/>
                <path d="M 128,80 L 128,128" fill="none" stroke="black"/>
                <path d="M 136,592 L 136,640" fill="none" stroke="black"/>
                <path d="M 184,544 L 184,592" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,80" fill="none" stroke="black"/>
                <path d="M 208,592 L 208,640" fill="none" stroke="black"/>
                <path d="M 232,48 L 232,96" fill="none" stroke="black"/>
                <path d="M 272,576 L 272,640" fill="none" stroke="black"/>
                <path d="M 288,96 L 288,128" fill="none" stroke="black"/>
                <path d="M 320,544 L 320,576" fill="none" stroke="black"/>
                <path d="M 344,576 L 344,640" fill="none" stroke="black"/>
                <path d="M 360,48 L 360,96" fill="none" stroke="black"/>
                <path d="M 384,128 L 384,560" fill="none" stroke="black"/>
                <path d="M 32,32 L 208,32" fill="none" stroke="black"/>
                <path d="M 232,48 L 360,48" fill="none" stroke="black"/>
                <path d="M 32,80 L 208,80" fill="none" stroke="black"/>
                <path d="M 232,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 384,128" fill="none" stroke="black"/>
                <path d="M 8,544 L 248,544" fill="none" stroke="black"/>
                <path d="M 312,544 L 328,544" fill="none" stroke="black"/>
                <path d="M 272,576 L 344,576" fill="none" stroke="black"/>
                <path d="M 24,592 L 96,592" fill="none" stroke="black"/>
                <path d="M 136,592 L 208,592" fill="none" stroke="black"/>
                <path d="M 24,640 L 96,640" fill="none" stroke="black"/>
                <path d="M 136,640 L 208,640" fill="none" stroke="black"/>
                <path d="M 272,640 L 344,640" fill="none" stroke="black"/>
                <g class="text">
                  <text x="84" y="52">Remote</text>
                  <text x="144" y="52">network</text>
                  <text x="60" y="68">(e.g.,</text>
                  <text x="112" y="68">cloud</text>
                  <text x="172" y="68">network)</text>
                  <text x="288" y="68">Service</text>
                  <text x="292" y="84">Operator</text>
                  <text x="124" y="148">Edge</text>
                  <text x="184" y="148">Computing</text>
                  <text x="252" y="148">Domain</text>
                  <text x="48" y="180">One</text>
                  <text x="76" y="180">or</text>
                  <text x="108" y="180">more</text>
                  <text x="168" y="180">Computing</text>
                  <text x="232" y="180">Nodes</text>
                  <text x="52" y="196">(IoT</text>
                  <text x="108" y="196">gateway,</text>
                  <text x="160" y="196">end</text>
                  <text x="212" y="196">devices,</text>
                  <text x="288" y="196">switches,</text>
                  <text x="68" y="212">routers,</text>
                  <text x="168" y="212">mini/micro-data</text>
                  <text x="268" y="212">centers,</text>
                  <text x="328" y="212">etc.)</text>
                  <text x="48" y="244">OAM</text>
                  <text x="108" y="244">Components</text>
                  <text x="40" y="260">-</text>
                  <text x="84" y="260">Resource</text>
                  <text x="160" y="260">Discovery</text>
                  <text x="216" y="260">and</text>
                  <text x="292" y="260">Authentication</text>
                  <text x="40" y="276">-</text>
                  <text x="68" y="276">Edge</text>
                  <text x="140" y="276">Organization</text>
                  <text x="208" y="276">and</text>
                  <text x="268" y="276">Federation</text>
                  <text x="40" y="292">-</text>
                  <text x="104" y="292">Multi-Tenancy</text>
                  <text x="176" y="292">and</text>
                  <text x="232" y="292">Isolation</text>
                  <text x="40" y="308">-</text>
                  <text x="64" y="308">...</text>
                  <text x="76" y="340">Functional</text>
                  <text x="164" y="340">Components</text>
                  <text x="40" y="356">-</text>
                  <text x="92" y="356">In-Network</text>
                  <text x="184" y="356">Computation</text>
                  <text x="40" y="372">-</text>
                  <text x="68" y="372">Edge</text>
                  <text x="120" y="372">Caching</text>
                  <text x="40" y="388">-</text>
                  <text x="120" y="388">North/South-bound</text>
                  <text x="248" y="388">Communication</text>
                  <text x="40" y="404">-</text>
                  <text x="104" y="404">Communication</text>
                  <text x="200" y="404">Brokering</text>
                  <text x="40" y="420">-</text>
                  <text x="72" y="420">Other</text>
                  <text x="132" y="420">Services</text>
                  <text x="40" y="436">-</text>
                  <text x="64" y="436">...</text>
                  <text x="80" y="468">Application</text>
                  <text x="172" y="468">Components</text>
                  <text x="40" y="484">-</text>
                  <text x="64" y="484">IoT</text>
                  <text x="112" y="484">Devices</text>
                  <text x="188" y="484">Management</text>
                  <text x="40" y="500">-</text>
                  <text x="68" y="500">Data</text>
                  <text x="132" y="500">Management</text>
                  <text x="192" y="500">and</text>
                  <text x="248" y="500">Analytics</text>
                  <text x="40" y="516">-</text>
                  <text x="64" y="516">...</text>
                  <text x="264" y="548">-</text>
                  <text x="280" y="548">-</text>
                  <text x="296" y="548">-</text>
                  <text x="344" y="548">-</text>
                  <text x="360" y="548">-</text>
                  <text x="376" y="548">-</text>
                  <text x="248" y="564">|</text>
                  <text x="248" y="596">|</text>
                  <text x="304" y="596">compute</text>
                  <text x="384" y="596">|</text>
                  <text x="56" y="612">End</text>
                  <text x="168" y="612">End</text>
                  <text x="232" y="612">...</text>
                  <text x="308" y="612">node/end</text>
                  <text x="52" y="628">Device</text>
                  <text x="88" y="628">1</text>
                  <text x="164" y="628">Device</text>
                  <text x="200" y="628">2</text>
                  <text x="236" y="628">...|</text>
                  <text x="300" y="628">device</text>
                  <text x="336" y="628">n</text>
                  <text x="384" y="628">|</text>
                  <text x="248" y="660">+</text>
                  <text x="264" y="660">-</text>
                  <text x="280" y="660">-</text>
                  <text x="296" y="660">-</text>
                  <text x="312" y="660">-</text>
                  <text x="328" y="660">-</text>
                  <text x="344" y="660">-</text>
                  <text x="360" y="660">-</text>
                  <text x="380" y="660">-+</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   +---------------------+
   |   Remote network    |  +---------------+
   |(e.g., cloud network)|  |   Service     |
   +-----------+---------+  |   Operator    |
               |            +------+--------+
               |                   |
+--------------+-------------------+-----------+
|            Edge Computing Domain             |
|                                              |
|   One or more Computing Nodes                |
|   (IoT gateway, end devices, switches,       |
|   routers, mini/micro-data centers, etc.)    |
|                                              |
|   OAM Components                             |
|   - Resource Discovery and Authentication    |
|   - Edge Organization and Federation         |
|   - Multi-Tenancy and Isolation              |
|   - ...                                      |
|                                              |
|   Functional Components                      |
|   - In-Network Computation                   |
|   - Edge Caching                             |
|   - North/South-bound Communication          |
|   - Communication Brokering                  |
|   - Other Services                           |
|   - ...                                      |
|                                              |
|   Application Components                     |
|   - IoT Devices Management                   |
|   - Data Management and Analytics            |
|   - ...                                      |
|                                              |
+------+--------------+-------- - - - -+- - - -+
       |              |       |        |       |
       |              |          +-----+--+
  +----+---+    +-----+--+    |  |compute |    |
  |  End   |    |  End   | ...   |node/end|
  |Device 1|    |Device 2| ...|  |device n|    |
  +--------+    +--------+       +--------+
                              + - - - - - - - -+
]]></artwork>
          </artset>
        </figure>
        <t>In the distributed model described in <xref target="rl-fig2"/>, the edge computing domain is composed of IoT edge gateways and IoT devices which are also used as computing nodes.
Edge computing domains are connected with a remote/cloud network, and with their respective service operator's system.
IoT devices/computing nodes provide logical functions, as part of a distributed machine learning application. The processing capabilities in IoT devices being limited, they require the support of other nodes: the training process for AI services is executed at IoT edge gateways or cloud networks and the prediction (inference) service is executed in the IoT devices.</t>
        <figure anchor="rl-fig2">
          <name>Example: Machine Learning over a Distributed IoT Edge Computing System</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="392" viewBox="0 0 392 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,352 L 8,560" fill="none" stroke="black"/>
                <path d="M 24,80 L 24,144" fill="none" stroke="black"/>
                <path d="M 24,448 L 24,512" fill="none" stroke="black"/>
                <path d="M 32,176 L 32,208" fill="none" stroke="black"/>
                <path d="M 32,272 L 32,320" fill="none" stroke="black"/>
                <path d="M 32,384 L 32,416" fill="none" stroke="black"/>
                <path d="M 64,144 L 64,176" fill="none" stroke="black"/>
                <path d="M 64,416 L 64,448" fill="none" stroke="black"/>
                <path d="M 96,80 L 96,144" fill="none" stroke="black"/>
                <path d="M 96,448 L 96,512" fill="none" stroke="black"/>
                <path d="M 128,208 L 128,272" fill="none" stroke="black"/>
                <path d="M 128,320 L 128,384" fill="none" stroke="black"/>
                <path d="M 136,80 L 136,144" fill="none" stroke="black"/>
                <path d="M 136,448 L 136,512" fill="none" stroke="black"/>
                <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                <path d="M 176,416 L 176,448" fill="none" stroke="black"/>
                <path d="M 208,80 L 208,144" fill="none" stroke="black"/>
                <path d="M 208,272 L 208,320" fill="none" stroke="black"/>
                <path d="M 208,448 L 208,512" fill="none" stroke="black"/>
                <path d="M 232,272 L 232,320" fill="none" stroke="black"/>
                <path d="M 280,80 L 280,144" fill="none" stroke="black"/>
                <path d="M 280,448 L 280,512" fill="none" stroke="black"/>
                <path d="M 288,208 L 288,272" fill="none" stroke="black"/>
                <path d="M 288,320 L 288,384" fill="none" stroke="black"/>
                <path d="M 320,144 L 320,176" fill="none" stroke="black"/>
                <path d="M 320,416 L 320,448" fill="none" stroke="black"/>
                <path d="M 344,176 L 344,208" fill="none" stroke="black"/>
                <path d="M 344,384 L 344,416" fill="none" stroke="black"/>
                <path d="M 352,80 L 352,144" fill="none" stroke="black"/>
                <path d="M 352,272 L 352,320" fill="none" stroke="black"/>
                <path d="M 352,448 L 352,512" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,240" fill="none" stroke="black"/>
                <path d="M 384,352 L 384,560" fill="none" stroke="black"/>
                <path d="M 8,32 L 384,32" fill="none" stroke="black"/>
                <path d="M 24,80 L 96,80" fill="none" stroke="black"/>
                <path d="M 136,80 L 208,80" fill="none" stroke="black"/>
                <path d="M 280,80 L 352,80" fill="none" stroke="black"/>
                <path d="M 24,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 136,144 L 208,144" fill="none" stroke="black"/>
                <path d="M 280,144 L 352,144" fill="none" stroke="black"/>
                <path d="M 32,176 L 344,176" fill="none" stroke="black"/>
                <path d="M 32,208 L 344,208" fill="none" stroke="black"/>
                <path d="M 8,240 L 384,240" fill="none" stroke="black"/>
                <path d="M 32,272 L 208,272" fill="none" stroke="black"/>
                <path d="M 232,272 L 352,272" fill="none" stroke="black"/>
                <path d="M 32,320 L 208,320" fill="none" stroke="black"/>
                <path d="M 232,320 L 352,320" fill="none" stroke="black"/>
                <path d="M 8,352 L 384,352" fill="none" stroke="black"/>
                <path d="M 32,384 L 344,384" fill="none" stroke="black"/>
                <path d="M 32,416 L 344,416" fill="none" stroke="black"/>
                <path d="M 24,448 L 96,448" fill="none" stroke="black"/>
                <path d="M 136,448 L 208,448" fill="none" stroke="black"/>
                <path d="M 280,448 L 352,448" fill="none" stroke="black"/>
                <path d="M 24,512 L 96,512" fill="none" stroke="black"/>
                <path d="M 136,512 L 208,512" fill="none" stroke="black"/>
                <path d="M 280,512 L 352,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 384,560" fill="none" stroke="black"/>
                <g class="text">
                  <text x="124" y="52">Edge</text>
                  <text x="184" y="52">Computing</text>
                  <text x="252" y="52">Domain</text>
                  <text x="56" y="100">Compute</text>
                  <text x="168" y="100">Compute</text>
                  <text x="312" y="100">Compute</text>
                  <text x="60" y="116">node/End</text>
                  <text x="172" y="116">node/End</text>
                  <text x="244" y="116">....</text>
                  <text x="316" y="116">node/End</text>
                  <text x="52" y="132">device</text>
                  <text x="88" y="132">1</text>
                  <text x="164" y="132">device</text>
                  <text x="200" y="132">2</text>
                  <text x="244" y="132">....</text>
                  <text x="308" y="132">device</text>
                  <text x="344" y="132">m</text>
                  <text x="136" y="196">IoT</text>
                  <text x="172" y="196">Edge</text>
                  <text x="224" y="196">Gateway</text>
                  <text x="84" y="292">Remote</text>
                  <text x="144" y="292">network</text>
                  <text x="288" y="292">Service</text>
                  <text x="60" y="308">(e.g.,</text>
                  <text x="112" y="308">cloud</text>
                  <text x="172" y="308">network)</text>
                  <text x="296" y="308">Operator(s)</text>
                  <text x="136" y="404">IoT</text>
                  <text x="172" y="404">Edge</text>
                  <text x="224" y="404">Gateway</text>
                  <text x="56" y="468">Compute</text>
                  <text x="168" y="468">Compute</text>
                  <text x="312" y="468">Compute</text>
                  <text x="60" y="484">node/End</text>
                  <text x="172" y="484">node/End</text>
                  <text x="244" y="484">....</text>
                  <text x="316" y="484">node/End</text>
                  <text x="52" y="500">device</text>
                  <text x="88" y="500">1</text>
                  <text x="164" y="500">device</text>
                  <text x="200" y="500">2</text>
                  <text x="244" y="500">....</text>
                  <text x="308" y="500">device</text>
                  <text x="344" y="500">n</text>
                  <text x="124" y="548">Edge</text>
                  <text x="184" y="548">Computing</text>
                  <text x="252" y="548">Domain</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+----------------------------------------------+
|            Edge Computing Domain             |
|                                              |
| +--------+    +--------+        +--------+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device m|   |
| +----+---+    +----+---+        +----+---+   |
|      |             |                 |       |
|  +---+-------------+-----------------+--+    |
|  |           IoT Edge Gateway           |    |
|  +-----------+-------------------+------+    |
|              |                   |           |
+--------------+-------------------+-----------+
               |                   |
   +-----------+---------+  +------+-------+
   |   Remote network    |  |   Service    |
   |(e.g., cloud network)|  |  Operator(s) |
   +-----------+---------+  +------+-------+
               |                   |
+--------------+-------------------+-----------+
|              |                   |           |
|  +-----------+-------------------+------+    |
|  |           IoT Edge Gateway           |    |
|  +---+-------------+-----------------+--+    |
|      |             |                 |       |
| +----+---+    +----+---+        +----+---+   |
| |Compute |    |Compute |        |Compute |   |
| |node/End|    |node/End|  ....  |node/End|   |
| |device 1|    |device 2|  ....  |device n|   |
| +--------+    +--------+        +--------+   |
|                                              |
|            Edge Computing Domain             |
+----------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <t>We now attempt to enumerate major edge computing domain components. They are here loosely organized into OAM (Operations, Administration, and Maintenance), functional and application components, with the understanding that the distinction between these classes may not always be clear, depending on actual system architectures. Some representative research challenges are associated with those functions. We used input from co-authors, IRTF attendees, and some comprehensive reviews of the field (<xref target="Yousefpour"/>, <xref target="Zhang2"/>, <xref target="Khan"/>).</t>
      </section>
      <section anchor="sec-components">
        <name>OAM Components</name>
        <t>Edge computing OAM goes beyond the network-related OAM functions listed in <xref target="RFC6291"/>. Besides infrastructure (network, storage, and computing resources), edge computing systems can also include computing environments (for VMs, software containers, functions), IoT devices, data, and code.</t>
        <t>Operation-related functions include performance monitoring for service level agreement measurement; fault management and provisioning for links, nodes, compute and storage resources, platforms, and services. Administration covers network/compute/storage resources, platforms and services discovery, configuration, and planning. Discovery during normal operation (e.g., discovery of compute nodes by endpoints) would typically not be included in OAM, however in this document we will not address it separately. Management covers monitoring and diagnostics of failures, as well as means to minimize their occurrence and take corrective actions. This may include software updates management, high service availability through redundancy and multipath communication. Centralized (e.g., SDN) and decentralized management systems can be used. Finally, we arbitrarily chose to address data management as an application component, however, in some systems, data management may be considered to be similar to a network management function.</t>
        <t>We further detail a few OAM components.</t>
        <section anchor="sec-dis-auth">
          <name>Resource Discovery and Authentication</name>
          <t>Discovery and authentication may target platforms, infrastructure resources, such as compute, network and storage, but also other resources such as IoT devices, sensors, data, code units, services, applications, or users interacting with the system. Broker-based solutions can be used, e.g., using an IoT gateway as a broker to discover IoT resources. More decentralized solutions can also be used in replacement or complement, e.g., CoAP enables multicast discovery of an IoT device, and CoAP service discovery enables obtaining a list of resources made available by this device <xref target="RFC7252"/>. Today, centralized gateway-based systems rely, for device authentication, on the installation of a secret on IoT devices and computing devices (e.g., a device certificate stored in a hardware security module, or a combination of code and data stored in a trusted execution environment).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Discovery, authentication, and trust establishment between IoT devices, compute nodes, and platforms, with regard to concerns such as mobility, heterogeneous devices and networks, scale, multiple trust domains, constrained devices, anonymity, and traceability</li>
            <li>Intermittent connectivity to the Internet, preventing relying on a third-party authority <xref target="Echeverria"/></li>
            <li>Resiliency to failures <xref target="Harchol"/>, denial of service attacks, easier physical access for attackers</li>
          </ul>
        </section>
        <section anchor="edge-organization-and-federation">
          <name>Edge Organization and Federation</name>
          <t>In a distributed system context, once edge devices have discovered and authenticated each other, they can be organized, or self-organize, into hierarchies or clusters. The organization structure may range from centralized to peer-to-peer, or it may be closely tied with other systems. Such groups can also form federations with other edge or remote clouds.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Support for scaling, and enabling fault-tolerance or self-healing <xref target="Jeong"/>. Besides using hierarchical organization to cope with scaling, another available and possibly complementary mechanism is multicast (<xref target="RFC7390"/> <xref target="I-D.ietf-core-groupcomm-bis"/>)</li>
            <li>Integration of edge computing with virtualized Radio Access Networks (Fog RAN) <xref target="I-D.bernardos-sfc-fog-ran"/> and with 5G access networks</li>
            <li>Sharing resources in multi-vendor/operator scenarios, to optimize criteria such as profit <xref target="Anglano"/>, resource usage, latency, or energy consumption</li>
            <li>Capacity planning, placement of infrastructure nodes to minimize delay <xref target="Fan"/>, cost, energy, etc.</li>
            <li>Incentives for participation, e.g. in peer-to-peer federation schemes</li>
          </ul>
        </section>
        <section anchor="multi-tenancy-and-isolation">
          <name>Multi-Tenancy and Isolation</name>
          <t>Some IoT edge computing systems make use of virtualized (compute, storage and networking) resources to address the need for secure multi-tenancy at the edge. This leads to "edge clouds" that share properties with the remote Cloud and can reuse some of its ecosystem. Virtualization function management is covered to a large extent by ETSI NFV and MEC standards activities. Projects such as <xref target="LFEDGE-EVE"/> further cover virtualization and its management into distributed edge computing settings.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Adapting cloud management platforms to the edge, to account for its distributed nature, e.g., using Conflict-free Replicated Data Types (CRDT) <xref target="Jeffery"/>, heterogeneity and customization, e.g., using intent-based management mechanisms <xref target="Cao"/>, and limited resources</li>
            <li>Minimizing virtual function instantiation time and resource usage</li>
          </ul>
        </section>
      </section>
      <section anchor="functional-components">
        <name>Functional Components</name>
        <section anchor="in-network-computation">
          <name>In-Network Computation</name>
          <t>A core function of IoT edge computing is to enable local computation on a node at the network edge, e.g. processing input data from sensors, making local decisions, preprocessing data, offloading computation on behalf of a device, service, or user. Related functions include orchestrating computation (in a centralized or distributed manner) and managing application lifecycles. Support for in-network computation may vary in terms of capability, e.g., computing nodes can host virtual machines, software containers, software actors or unikernels able to run stateful or stateless code, or a rules engine providing an API to register actions in response to conditions such as IoT device ID, sensor values to check, thresholds, etc.</t>
          <t>Edge offloading includes offloading to and from an IoT device, and to and from a network node. <xref target="Cloudlets"/> offer an example of offloading from an end device to a network node. On the other side, oneM2M is an example of a system that allows a cloud-based IoT platform to transfer resources and tasks to a target edge node <xref target="oneM2M-TR0052"/>. Once transferred, the edge node can directly support IoT devices it serves with the service offloaded by the cloud (e.g. group management, location management, etc.)</t>
          <t>QoS can be provided in some systems through the combination of network QoS (e.g., traffic engineering or wireless resource scheduling) and compute/storage resource allocations. For example, in some systems, a bandwidth manager service can be exposed to enable allocation of bandwidth to/from an edge computing application instance.</t>
          <t>In-network computation may leverage underlying services, provided using data generated by IoT devices and access networks. Such services include IoT device location, radio network information, bandwidth management and congestion management (e.g., by the congestion management feature of oneM2M <xref target="oneM2M-TR0052"/>).</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>(Computation placement) Selecting, in a centralized or distributed/peer-to-peer manner, an appropriate compute device based on available resources, location of data input and data sinks, compute node properties, etc., and with varying goals including for example end-to-end latency, privacy, high availability, energy conservation, or network efficiency, e.g. using load balancing techniques to avoid congestion</li>
            <li>Onboarding code on a platform or computing device, and invoking remote code execution, possibly as part of a distributed programming model and with respect to similar concerns of latency, privacy, etc. These operations should deal with heterogeneous compute nodes <xref target="Schafer"/>, and may in some cases also support end devices, including IoT devices, as compute nodes <xref target="Larrea"/></li>
            <li>Adapting Quality of Results (QoR) for applications where a perfect result is not necessary <xref target="Li"/></li>
            <li>Assisted or automatic partitioning of code <xref target="I-D.sarathchandra-coin-appcentres"/></li>
            <li>Supporting computation across trust domains, e.g. verifying computation results</li>
            <li>Support for computation mobility: relocating an instance from one compute node to another, while maintaining a given service level; session continuity when communicating with end devices that are mobile, possibly at high speed (e.g. in vehicular scenarios); defining lightweight execution environments for secure code mobility, e.g., using WebAssembly <xref target="Nieke"/></li>
            <li>Defining, managing, and verifying Service Level Agreements (SLA) for edge computing systems. Pricing is a related challenge.</li>
          </ul>
        </section>
        <section anchor="edge-storage-and-caching">
          <name>Edge Storage and Caching</name>
          <t>Local storage or caching enable local data processing (e.g., pre-processing or analysis), as well as delayed data transfer to the cloud or delayed physical shipping.
An edge node may offer local data storage (where persistence is subject to retention policies), caching, or both.
Caching generally refers to temporary storage to improve performance with no persistence guarantees.
An edge caching component manages data persistence, e.g., it schedules removal of data when it is no longer needed.
Other related aspects include authenticating and encrypting data.
Edge storage and caching can take the form of a distributed storage system.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>(Cache and data placement) Using cache positioning and data placement strategies to minimize data retrieval delay <xref target="Liu"/>, energy consumption. Caches may be positioned in the access network infrastructure, or on end devices.</li>
            <li>Maintaining consistency, freshness, and privacy of stored/cached data in systems that are distributed, constrained, and dynamic (e.g. due to end devices and computing nodes churn or mobility). For example, <xref target="Mortazavi"/> exploits a hierarchical storage organization. Freshness-related metrics include the age of information <xref target="Yates"/>, that captures the timeliness of information from a sender (e.g. an IoT device).</li>
          </ul>
        </section>
        <section anchor="northboundsouthbound-communication">
          <name>Northbound/Southbound Communication</name>
          <t>An edge cloud may provide a northbound data plane or management plane interface to a remote network, e.g., a cloud, home or enterprise network. This interface does not exist in standalone (local-only) scenarios. To support such an interface when it exists, an edge computing component needs to expose an API, deal with authentication and authorization, and support secure communication.</t>
          <t>An edge cloud may provide an API or interface to local or mobile users, for example, to provide access to services and applications, or to manage data published by local/mobile devices.</t>
          <t>Edge computing nodes communicate with IoT devices over a southbound interface, typically for data acquisition and IoT device management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Defining edge computing abstractions, such as PaaS <xref target="Yangui"/>, suitable for users and cloud systems to interact with edge computing systems, and dealing with interoperability issues such as data models heterogeneity.</li>
          </ul>
        </section>
        <section anchor="communication-brokering">
          <name>Communication Brokering</name>
          <t>A typical function of IoT edge computing is to facilitate communication with IoT devices: for example, enable clients to register as recipients for data from devices, as well as forwarding/routing of traffic to or from IoT devices, enabling various data discovery and redistribution patterns, e.g., north-south with clouds, east-west with other edge devices <xref target="I-D.mcbride-edge-data-discovery-overview"/>.
Another related aspect is dispatching alerts and notifications to interested consumers both inside and outside of the edge computing domain.
Protocol translation, analytics, and video transcoding may also be performed when necessary.</t>
          <t>Communication brokering may be centralized in some systems, e.g., using a hub-and-spoke message broker, or distributed like with message buses, possibly in a layered bus approach.
Distributed systems may leverage direct communication between end devices, over device-to-device links.
A broker can ensure communication reliability, traceability, and in some cases transaction management.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Enabling secure and resilient communication between IoT devices and remote cloud, e.g. through multipath support</li>
          </ul>
        </section>
      </section>
      <section anchor="application-components">
        <name>Application Components</name>
        <t>IoT edge computing can host applications such as the ones mentioned in <xref target="sec-uc"/>. While describing components of individual applications is out of our scope, some of those applications share similar functions, such as IoT device management, data management, described below.</t>
        <section anchor="iot-devices-management">
          <name>IoT Devices Management</name>
          <t>IoT device management includes managing information about the IoT devices, including their sensors, how to communicate with them, etc. Edge computing addresses the scalability challenges from the massive number of IoT devices by separating the scalability domain into edge/local networks and remote networks. For example, in the context of the oneM2M standard, the software campaign feature enables installing, deleting, activating, and deactivating software functions/services on a potentially large number of edge nodes <xref target="oneM2M-TR0052"/>. Using a dashboard or a management software, a service provider issues those requests through an IoT cloud platform supporting the software campaign functionality.</t>
          <t>Challenges listed in <xref target="sec-dis-auth"/> may be applicable to IoT devices management as well.</t>
        </section>
        <section anchor="sec-data">
          <name>Data Management and Analytics</name>
          <t>Data storage and processing at the edge is a major aspect of IoT edge computing, directly addressing high-level IoT challenges listed in <xref target="sec-challenges"/>. Data analysis such as performed in AI/ML tasks performed at the edge may benefit from specialized hardware support on computing nodes.</t>
          <t>Related challenges include:</t>
          <ul spacing="normal">
            <li>Addressing concerns on resource usage, security, and privacy when sharing, processing, discovering, or managing data. For example by presenting data in views composed of an aggregation of related data <xref target="Zhang"/>; protecting data communication between authenticated peers <xref target="Basudan"/>; classifying data (e.g., in terms of privacy, importance, validity, etc.); compressing and encrypting data, e.g., using homomorphic encryption to directly process encrypted data <xref target="Stanciu"/>.</li>
            <li>Other concerns on edge data discovery (e.g., streaming data, metadata, events) include siloization and lack of standard in edge environments that can be dynamic (e.g. vehicular networks) and heterogeneous <xref target="I-D.mcbride-edge-data-discovery-overview"/></li>
            <li>Data-driven programming models <xref target="Renart"/>, e.g. event-based, including handling of naming and data abstractions</li>
            <li>Addressing concerns such as limited resources, privacy, dynamic and heterogeneous environment, to deploy machine learning at the edge. For example, making machine learning more lightweight and distributed (e.g., to enable distributed inference at the edge), supporting shorter training time and simplified models, and supporting models that can be compressed for efficient communication <xref target="Murshed"/></li>
            <li>While edge computing can support IoT services independently of cloud computing, it can also be connected to cloud computing. Thus, the relationship of IoT edge computing to cloud computing, with regard to data management, is another potential challenge <xref target="ISO_TR"/></li>
          </ul>
        </section>
      </section>
      <section anchor="simulation-and-emulation-environments">
        <name>Simulation and Emulation Environments</name>
        <t>IoT Edge Computing brings new challenges to simulation and emulation tools used by researchers and developers. A varied set of applications, network, and computing technologies can coexist in a distributed system, which makes modeling difficult. Scale, mobility, and resource management are additional challenges <xref target="SimulatingFog"/>.</t>
        <t>Tools include simulators, where simplified application logic runs on top of a fog network model, and emulators, where actual applications can be deployed, typically in software containers, over a cloud infrastructure (e.g. Docker, Kubernetes) itself running over a network emulating network edge conditions such as variable delays, throughput and mobility events. To gain in scale, emulated and simulated systems can be used together in hybrid federation-based approaches <xref target="PseudoDynamicTesting"/>, while to gain in realism physical devices can be interconnected with emulated systems. Examples of related work and platforms include the publicly accessible MEC sandbox work recently initiated in ETSI <xref target="ETSI_Sandbox"/>, and open source simulators and emulators (<xref target="AdvantEDGE"/> emulator and tools cited in <xref target="SimulatingFog"/>). EdgeNet <xref target="Senel"/> is a globally distributed edge cloud for Internet researchers, using nodes contributed by institutions, and based on Docker for containerization and Kubernetes for deployment and node management.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Privacy and security are drivers for the adoption of edge computing for IoT (<xref target="sec-priv"/>). As discussed in <xref target="sec-dis-auth"/>, authentication and trust (between computing nodes, management nodes, end devices) can be challenging as scale, mobility, and heterogeneity increase. The sometimes disconnected nature of edge resources can prevent relying on a third-party authority. Distributed edge computing is exposed to issues with reliability and denial of service attacks. Personal or proprietary IoT data leakage is also a major threat, especially due to the distributed nature of the systems (<xref target="sec-data"/>).</t>
      <t>However, edge computing also brings solutions in the security space: maintaining privacy by computing sensitive data closer to data generators is a major use case for IoT edge computing.
An edge cloud can be used to take actions based on sensitive data, or to anonymize or aggregate data prior to transmitting to a remote cloud server. 
Edge computing communication brokering functions can also be used to secure communication between edge and cloud networks.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>IoT edge computing plays an essential role, complementary to the cloud, to enable IoT systems in some situations. This document starts by presenting use cases and listing core challenges faced by IoT, that drive the need for IoT edge computing. The first part of this document may therefore help focusing future research efforts on the aspects of IoT edge computing where it is most useful. A second part of this document presents a general system model and a structured overview of the associated research challenges and related work. The structure, based on the system model, is not meant to be restrictive, and exists for the purpose of having a link between individual research areas and where they are applicable in an IoT edge computing system.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, <contact fullname="Marie-José Montpetit"/>, Carlos J. Bernardos, Milan Milenkovic, Dale Seed, JaeSeung Song, Roberto Morabito, Carsten Bormann and <contact fullname="Ari Keränen"/> for their valuable comments and suggestions on this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.mcbride-edge-data-discovery-overview" target="https://www.ietf.org/archive/id/draft-mcbride-edge-data-discovery-overview-05.txt">
        <front>
          <title>Edge Data Discovery for COIN</title>
          <author fullname="Mike McBride" initials="M." surname="McBride">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Dirk Kutscher" initials="D." surname="Kutscher">
            <organization>Emden University</organization>
          </author>
          <author fullname="Eve Schooler" initials="E." surname="Schooler">
            <organization>Intel</organization>
          </author>
          <author fullname="Carlos J. Bernardos" initials="C. J." surname="Bernardos">
            <organization>Universidad Carlos III de Madrid</organization>
          </author>
          <author fullname="Diego Lopez" initials="D." surname="Lopez">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Xavier de Foy" initials="X." surname="de Foy">
            <organization>InterDigital Communications, LLC</organization>
          </author>
          <date day="1" month="November" year="2020"/>
          <abstract>
            <t>   This document describes the problem of distributed data discovery in
   edge computing, and in particular for computing-in-the-network
   (COIN), which may require both the marshalling of data at the outset
   of a computation and the persistence of the resultant data after the
   computation.  Although the data might originate at the network edge,
   as more and more distributed data is created, processed, and stored,
   it becomes increasingly dispersed throughout the network.  There
   needs to be a standard way to find it.  New and existing protocols
   will need to be developed to support distributed data discovery at
   the network edge and beyond.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-mcbride-edge-data-discovery-overview-05"/>
      </reference>
      <reference anchor="RFC6291" target="https://www.rfc-editor.org/info/rfc6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson">
            <organization/>
          </author>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort">
            <organization/>
          </author>
          <author fullname="R. Bonica" initials="R." surname="Bonica">
            <organization/>
          </author>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu">
            <organization/>
          </author>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield">
            <organization/>
          </author>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood.  Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM.  There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term.  This memo documents an Internet Best Current  Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="RFC8578" target="https://www.rfc-editor.org/info/rfc8578">
        <front>
          <title>Deterministic Networking Use Cases</title>
          <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document presents use cases for diverse industries that have in common a need for "deterministic flows".  "Deterministic" in this context means that such flows provide guaranteed bandwidth, bounded latency, and other properties germane to the transport of time-sensitive data.  These use cases differ notably in their network topologies and specific desired behavior, providing as a group broad industry context for Deterministic Networking (DetNet).  For each use case, this document will identify the use case, identify representative solutions used today, and describe potential improvements that DetNet can enable.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8578"/>
        <seriesInfo name="DOI" value="10.17487/RFC8578"/>
      </reference>
      <reference anchor="I-D.irtf-t2trg-rest-iot" target="https://www.ietf.org/archive/id/draft-irtf-t2trg-rest-iot-11.txt">
        <front>
          <title>Guidance on RESTful Design for Internet of Things Systems</title>
          <author fullname="Ari Keränen" initials="A." surname="Keränen">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
            <organization>Siemens</organization>
          </author>
          <author fullname="Klaus Hartke" initials="K." surname="Hartke">
         </author>
          <date day="11" month="January" year="2023"/>
          <abstract>
            <t>   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-11"/>
      </reference>
      <reference anchor="Ashton" target="http://www.itrco.jp/libraries/RFIDjournal-That%20Internet%20of%20Things%20Thing.pdf">
        <front>
          <title>That Internet of Things thing</title>
          <author initials="K." surname="Ashton">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
        <refcontent>RFID J. vol. 22, no. 7, pp. 97-114</refcontent>
      </reference>
      <reference anchor="Lin">
        <front>
          <title>A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications</title>
          <author initials="J." surname="Lin" fullname="Jie Lin">
            <organization/>
          </author>
          <author initials="W." surname="Yu" fullname="Wei Yu">
            <organization/>
          </author>
          <author initials="N." surname="Zhang" fullname="Nan Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Yang" fullname="Xinyu Yang">
            <organization/>
          </author>
          <author initials="H." surname="Zhang" fullname="Hanlin Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Zhao" fullname="Wei Zhao">
            <organization/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 4, no. 5, pp. 1125-1142"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2683200"/>
      </reference>
      <reference anchor="NIST">
        <front>
          <title>The NIST definition of cloud computing</title>
          <author initials="P." surname="Mell" fullname="P M Mell">
            <organization/>
          </author>
          <author initials="T." surname="Grance" fullname="T Grance">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
        <seriesInfo name="National Institute of Standards and Technology" value="report"/>
        <seriesInfo name="DOI" value="10.6028/nist.sp.800-145"/>
      </reference>
      <reference anchor="Botta">
        <front>
          <title>Integration of Cloud computing and Internet of Things: A survey</title>
          <author initials="A." surname="Botta" fullname="Alessio Botta">
            <organization/>
          </author>
          <author initials="W." surname="de Donato" fullname="Walter de Donato">
            <organization/>
          </author>
          <author initials="V." surname="Persico" fullname="Valerio Persico">
            <organization/>
          </author>
          <author initials="A." surname="Pescape" fullname="Antonio Pescape">
            <organization/>
          </author>
          <date year="2016" month="March"/>
        </front>
        <seriesInfo name="Future Generation Computer Systems" value="vol. 56, pp. 684-700"/>
        <seriesInfo name="DOI" value="10.1016/j.future.2015.09.021"/>
      </reference>
      <reference anchor="Shi">
        <front>
          <title>Edge Computing: Vision and Challenges</title>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization/>
          </author>
          <author initials="J." surname="Cao" fullname="Jie Cao">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization/>
          </author>
          <author initials="Y." surname="Li" fullname="Youhuizi Li">
            <organization/>
          </author>
          <author initials="L." surname="Xu" fullname="Lanyu Xu">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 3, no. 5, pp. 637-646"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2579198"/>
      </reference>
      <reference anchor="Mahadev">
        <front>
          <title>The Emergence of Edge Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="Mahadev Satyanarayanan">
            <organization/>
          </author>
          <date year="2017" month="January"/>
        </front>
        <seriesInfo name="Computer" value="vol. 50, no. 1, pp. 30-39"/>
        <seriesInfo name="DOI" value="10.1109/mc.2017.9"/>
      </reference>
      <reference anchor="Chiang">
        <front>
          <title>Fog and IoT: An Overview of Research Opportunities</title>
          <author initials="M." surname="Chiang" fullname="Mung Chiang">
            <organization/>
          </author>
          <author initials="T." surname="Zhang" fullname="Tao Zhang">
            <organization/>
          </author>
          <date year="2016" month="December"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 3, no. 6, pp. 854-864"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2584538"/>
      </reference>
      <reference anchor="Weiner">
        <front>
          <title>Design of a low-latency, high-reliability wireless communication system for control applications</title>
          <author initials="M." surname="Weiner" fullname="Matthew Weiner">
            <organization/>
          </author>
          <author initials="M." surname="Jorgovanovic" fullname="Milos Jorgovanovic">
            <organization/>
          </author>
          <author initials="A." surname="Sahai" fullname="Anant Sahai">
            <organization/>
          </author>
          <author initials="B." surname="Nikolie" fullname="Borivoje Nikolie">
            <organization/>
          </author>
          <date year="2014" month="June"/>
        </front>
        <seriesInfo name="2014 IEEE International Conference on Communications" value="(ICC)"/>
        <seriesInfo name="DOI" value="10.1109/icc.2014.6883918"/>
      </reference>
      <reference anchor="Kelly" target="https://campustechnology.com/articles/2015/04/15/internet-of-things-data-to-top-1-6-zettabytes-by-2020.aspx">
        <front>
          <title>Internet of Things Data to Top 1.6 Zettabytes by 2022</title>
          <author initials="R." surname="Kelly">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <refcontent>Retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="ISO_TR" target="https://www.iso.org/standard/53284.html">
        <front>
          <title>Internet of things (IoT) - Edge computing</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <seriesInfo name="ISO/IEC" value="TR 30164"/>
      </reference>
      <reference anchor="OpenFog" target="https://iiconsortium.org/pdf/OpenFog_Reference_Architecture_2_09_17.pdf">
        <front>
          <title>OpenFog Reference Architecture for Fog Computing</title>
          <author>
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <refcontent>OpenFog Consortium</refcontent>
      </reference>
      <reference anchor="ETSI_MEC_03" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf">
        <front>
          <title>Mobile Edge Computing (MEC); Framework and Reference Architecture</title>
          <author>
            <organization>ETSI</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>ETSI GS 003</refcontent>
      </reference>
      <reference anchor="ETSI_MEC_01" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf">
        <front>
          <title>Multi-access Edge Computing (MEC); Terminology</title>
          <author initials="" surname="ETSI">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>ETSI GS 001</refcontent>
      </reference>
      <reference anchor="NVIDIA" target="https://devblogs.nvidia.com/training-self-driving-vehicles-challenge-scale/">
        <front>
          <title>Training AI for Self-Driving Vehicles: the Challenge of Scale</title>
          <author initials="A." surname="Grzywaczewski">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <refcontent>NVIDIA Developer Blog, retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="_60802" target="https://grouper.ieee.org/groups/802/1/files/public/docs2018/60802-industrial-use-cases-0918-v13.pdf">
        <front>
          <title>Use Cases IEC/IEEE 60802 V1.3</title>
          <author>
            <organization>IEC/IEEE</organization>
          </author>
          <date year="2018"/>
        </front>
        <seriesInfo name="IEC/IEEE" value="60802"/>
      </reference>
      <reference anchor="ENERGY">
        <front>
          <title>Revealing household characteristics from smart meter data</title>
          <author initials="C." surname="Beckel" fullname="Christian Beckel">
            <organization/>
          </author>
          <author initials="L." surname="Sadamori" fullname="Leyna Sadamori">
            <organization/>
          </author>
          <author initials="T." surname="Staake" fullname="Thorsten Staake">
            <organization/>
          </author>
          <author initials="S." surname="Santini" fullname="Silvia Santini">
            <organization/>
          </author>
          <date year="2014" month="December"/>
        </front>
        <seriesInfo name="Energy" value="vol. 78, pp. 397-410"/>
        <seriesInfo name="DOI" value="10.1016/j.energy.2014.10.025"/>
      </reference>
      <reference anchor="ETSI_Sandbox" target="https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=57671">
        <front>
          <title>Multi-access Edge Computing (MEC) MEC Sandbox Work Item</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Portal</refcontent>
      </reference>
      <reference anchor="AdvantEDGE" target="https://github.com/InterDigitalInc/AdvantEDGE">
        <front>
          <title>Mobile Edge Emulation Platform</title>
          <author>
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Source Code Repository</refcontent>
      </reference>
      <reference anchor="SimulatingFog">
        <front>
          <title>Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges</title>
          <author initials="S." surname="Svorobej" fullname="Sergej Svorobej">
            <organization/>
          </author>
          <author initials="P." surname="Takako Endo" fullname="Patricia Takako Endo">
            <organization/>
          </author>
          <author initials="M." surname="Bendechache" fullname="Malika Bendechache">
            <organization/>
          </author>
          <author initials="C." surname="Filelis-Papadopoulos" fullname="Christos Filelis-Papadopoulos">
            <organization/>
          </author>
          <author initials="K." surname="Giannoutakis" fullname="Konstantinos Giannoutakis">
            <organization/>
          </author>
          <author initials="G." surname="Gravvanis" fullname="George Gravvanis">
            <organization/>
          </author>
          <author initials="D." surname="Tzovaras" fullname="Dimitrios Tzovaras">
            <organization/>
          </author>
          <author initials="J." surname="Byrne" fullname="James Byrne">
            <organization/>
          </author>
          <author initials="T." surname="Lynn" fullname="Theo Lynn">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <seriesInfo name="Future Internet" value="vol. 11, no. 3, pp. 55"/>
        <seriesInfo name="DOI" value="10.3390/fi11030055"/>
      </reference>
      <reference anchor="PseudoDynamicTesting">
        <front>
          <title>Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems</title>
          <author initials="M." surname="Ficco" fullname="Massimo Ficco">
            <organization/>
          </author>
          <author initials="C." surname="Esposito" fullname="Christian Esposito">
            <organization/>
          </author>
          <author initials="Y." surname="Xiang" fullname="Yang Xiang">
            <organization/>
          </author>
          <author initials="F." surname="Palmieri" fullname="Francesco Palmieri">
            <organization/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="vol. 55, no. 11, pp. 98-104"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2017.1700328"/>
      </reference>
      <reference anchor="LFEDGE-EVE" target="https://www.lfedge.org/projects/eve">
        <front>
          <title>Project Edge Virtualization Engine (EVE)</title>
          <author initials="" surname="Linux Foundation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
        <refcontent>Portal, retrieved on 2022-05-24</refcontent>
      </reference>
      <reference anchor="Yousefpour">
        <front>
          <title>All one needs to know about fog computing and related edge computing paradigms: A complete survey</title>
          <author initials="A." surname="Yousefpour" fullname="Ashkan Yousefpour">
            <organization/>
          </author>
          <author initials="C." surname="Fung" fullname="Caleb Fung">
            <organization/>
          </author>
          <author initials="T." surname="Nguyen" fullname="Tam Nguyen">
            <organization/>
          </author>
          <author initials="K." surname="Kadiyala" fullname="Krishna Kadiyala">
            <organization/>
          </author>
          <author initials="F." surname="Jalali" fullname="Fatemeh Jalali">
            <organization/>
          </author>
          <author initials="A." surname="Niakanlahiji" fullname="Amirreza Niakanlahiji">
            <organization/>
          </author>
          <author initials="J." surname="Kong" fullname="Jian Kong">
            <organization/>
          </author>
          <author initials="J." surname="Jue" fullname="Jason P. Jue">
            <organization/>
          </author>
          <date year="2019" month="September"/>
        </front>
        <seriesInfo name="Journal of Systems Architecture" value="vol. 98, pp. 289-330"/>
        <seriesInfo name="DOI" value="10.1016/j.sysarc.2019.02.009"/>
      </reference>
      <reference anchor="I-D.bernardos-sfc-fog-ran" target="https://www.ietf.org/archive/id/draft-bernardos-sfc-fog-ran-10.txt">
        <front>
          <title>Service Function Chaining Use Cases in Fog RAN</title>
          <author fullname="Carlos J. Bernardos" initials="C. J." surname="Bernardos">
            <organization>UC3M</organization>
          </author>
          <author fullname="Alain Mourad" initials="A." surname="Mourad">
            <organization>InterDigital</organization>
          </author>
          <date day="22" month="October" year="2021"/>
          <abstract>
            <t>   Fog Radio Access Networks (RAN) refers to the part of the RAN that is
   virtualized at the very edge of the network, even at the end-user
   device.  Fog RAN support is considered critical for the 5G mobile
   network architectures currently being developed in various research,
   standardization and industry forums.  Since fog RAN builds on top of
   virtualization and can involve several virtual functions running on
   different virtualized resources, Service function chaining (SFC)
   support for the fog RAN will be critical.  This document describes
   the overall fog RAN approach and also gives some use cases.  Finally
   it proposes some requirements to be considered in the development of
   the SFC architecture and related protocols.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bernardos-sfc-fog-ran-10"/>
      </reference>
      <reference anchor="Schafer">
        <front>
          <title>Tasklets: Overcoming Heterogeneity in Distributed Computing Systems</title>
          <author initials="D." surname="Schafer" fullname="Dominik Schafer">
            <organization/>
          </author>
          <author initials="J." surname="Edinger" fullname="Janick Edinger">
            <organization/>
          </author>
          <author initials="S." surname="VanSyckel" fullname="Sebastian VanSyckel">
            <organization/>
          </author>
          <author initials="J." surname="Paluska" fullname="Justin Mazzola Paluska">
            <organization/>
          </author>
          <author initials="C." surname="Becker" fullname="Christian Becker">
            <organization/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <seriesInfo name="2016 IEEE 36th International Conference on Distributed Computing Systems Workshops" value="(ICDCSW)"/>
        <seriesInfo name="DOI" value="10.1109/icdcsw.2016.22"/>
      </reference>
      <reference anchor="Echeverria">
        <front>
          <title>Establishing Trusted Identities in Disconnected Edge Environments</title>
          <author initials="S." surname="Echeverria" fullname="Sebastian Echeverria">
            <organization/>
          </author>
          <author initials="D." surname="Klinedinst" fullname="Dan Klinedinst">
            <organization/>
          </author>
          <author initials="K." surname="Williams" fullname="Keegan Williams">
            <organization/>
          </author>
          <author initials="G." surname="Lewis" fullname="Grace A. Lewis">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="2016 IEEE/ACM Symposium on Edge Computing" value="(SEC)"/>
        <seriesInfo name="DOI" value="10.1109/sec.2016.27"/>
      </reference>
      <reference anchor="Harchol">
        <front>
          <title>CESSNA: Resilient Edge-Computing</title>
          <author initials="Y." surname="Harchol" fullname="Yotam Harchol">
            <organization/>
          </author>
          <author initials="A." surname="Mushtaq" fullname="Aisha Mushtaq">
            <organization/>
          </author>
          <author initials="J." surname="McCauley" fullname="James McCauley">
            <organization/>
          </author>
          <author initials="A." surname="Panda" fullname="Aurojit Panda">
            <organization/>
          </author>
          <author initials="S." surname="Shenker" fullname="Scott Shenker">
            <organization/>
          </author>
          <date year="2018" month="August"/>
        </front>
        <seriesInfo name="Proceedings of the 2018 Workshop on Mobile Edge" value="Communications"/>
        <seriesInfo name="DOI" value="10.1145/3229556.3229558"/>
      </reference>
      <reference anchor="Anglano">
        <front>
          <title>A game-theoretic approach to coalition formation in fog provider federations</title>
          <author initials="C." surname="Anglano" fullname="Cosimo Anglano">
            <organization/>
          </author>
          <author initials="M." surname="Canonico" fullname="Massimo Canonico">
            <organization/>
          </author>
          <author initials="P." surname="Castagno" fullname="Paolo Castagno">
            <organization/>
          </author>
          <author initials="M." surname="Guazzone" fullname="Marco Guazzone">
            <organization/>
          </author>
          <author initials="M." surname="Sereno" fullname="Matteo Sereno">
            <organization/>
          </author>
          <date year="2018" month="April"/>
        </front>
        <seriesInfo name="2018 Third International Conference on Fog and Mobile Edge Computing" value="(FMEC)"/>
        <seriesInfo name="DOI" value="10.1109/fmec.2018.8364054"/>
      </reference>
      <reference anchor="Jeong">
        <front>
          <title>Towards a distributed computing framework for Fog</title>
          <author initials="T." surname="Jeong" fullname="Taeyeol Jeong">
            <organization/>
          </author>
          <author initials="J." surname="Chung" fullname="Jaeyoon Chung">
            <organization/>
          </author>
          <author initials="J." surname="Hong" fullname="James Won-Ki Hong">
            <organization/>
          </author>
          <author initials="S." surname="Ha" fullname="Sangtae Ha">
            <organization/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <seriesInfo name="2017 IEEE Fog World Congress" value="(FWC)"/>
        <seriesInfo name="DOI" value="10.1109/fwc.2017.8368528"/>
      </reference>
      <reference anchor="Fan">
        <front>
          <title>Cost Aware cloudlet Placement for big data processing at the edge</title>
          <author initials="Q." surname="Fan" fullname="Qiang Fan">
            <organization/>
          </author>
          <author initials="N." surname="Ansari" fullname="Nirwan Ansari">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <seriesInfo name="2017 IEEE International Conference on Communications" value="(ICC)"/>
        <seriesInfo name="DOI" value="10.1109/icc.2017.7996722"/>
      </reference>
      <reference anchor="Yangui">
        <front>
          <title>A platform as-a-service for hybrid cloud/fog environments</title>
          <author initials="S." surname="Yangui" fullname="Sami Yangui">
            <organization/>
          </author>
          <author initials="P." surname="Ravindran" fullname="Pradeep Ravindran">
            <organization/>
          </author>
          <author initials="O." surname="Bibani" fullname="Ons Bibani">
            <organization/>
          </author>
          <author initials="R." surname="Glitho" fullname="Roch H. Glitho">
            <organization/>
          </author>
          <author initials="N." surname="Ben Hadj-Alouane" fullname="Nejib Ben Hadj-Alouane">
            <organization/>
          </author>
          <author initials="M." surname="Morrow" fullname="Monique J. Morrow">
            <organization/>
          </author>
          <author initials="P." surname="Polakos" fullname="Paul A. Polakos">
            <organization/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <seriesInfo name="2016 IEEE International Symposium on Local and Metropolitan Area Networks" value="(LANMAN)"/>
        <seriesInfo name="DOI" value="10.1109/lanman.2016.7548853"/>
      </reference>
      <reference anchor="Li">
        <front>
          <title>MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization</title>
          <author initials="Y." surname="Li" fullname="Yongbo Li">
            <organization/>
          </author>
          <author initials="Y." surname="Chen" fullname="Yurong Chen">
            <organization/>
          </author>
          <author initials="T." surname="Lan" fullname="Tian Lan">
            <organization/>
          </author>
          <author initials="G." surname="Venkataramani" fullname="Guru Venkataramani">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <seriesInfo name="2017 IEEE 37th International Conference on Distributed Computing Systems" value="(ICDCS)"/>
        <seriesInfo name="DOI" value="10.1109/icdcs.2017.54"/>
      </reference>
      <reference anchor="Liu">
        <front>
          <title>Cache Placement in Fog-RANs: From Centralized to Distributed Algorithms</title>
          <author initials="J." surname="Liu" fullname="Juan Liu">
            <organization/>
          </author>
          <author initials="B." surname="Bai" fullname="Bo Bai">
            <organization/>
          </author>
          <author initials="J." surname="Zhang" fullname="Jun Zhang">
            <organization/>
          </author>
          <author initials="K." surname="Letaief" fullname="Khaled B. Letaief">
            <organization/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <seriesInfo name="IEEE Transactions on Wireless Communications" value="vol. 16, no. 11, pp. 7039-7051"/>
        <seriesInfo name="DOI" value="10.1109/twc.2017.2737015"/>
      </reference>
      <reference anchor="Zhang">
        <front>
          <title>Firework: Big Data Sharing and Processing in Collaborative Edge Environment</title>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization/>
          </author>
          <author initials="X." surname="Zhang" fullname="Xiaohong Zhang">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qingyang Zhang">
            <organization/>
          </author>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization/>
          </author>
          <author initials="H." surname="Zhong" fullname="Hong Zhong">
            <organization/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <seriesInfo name="2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies" value="(HotWeb)"/>
        <seriesInfo name="DOI" value="10.1109/hotweb.2016.12"/>
      </reference>
      <reference anchor="Basudan">
        <front>
          <title>A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing</title>
          <author initials="S." surname="Basudan" fullname="Sultan Basudan">
            <organization/>
          </author>
          <author initials="X." surname="Lin" fullname="Xiaodong Lin">
            <organization/>
          </author>
          <author initials="K." surname="Sankaranarayanan" fullname="Karthik Sankaranarayanan">
            <organization/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 4, no. 3, pp. 772-782"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2666783"/>
      </reference>
      <reference anchor="Renart">
        <front>
          <title>Data-Driven Stream Processing at the Edge</title>
          <author initials="E." surname="Renart" fullname="Eduard Gibert Renart">
            <organization/>
          </author>
          <author initials="J." surname="Diaz-Montes" fullname="Javier Diaz-Montes">
            <organization/>
          </author>
          <author initials="M." surname="Parashar" fullname="Manish Parashar">
            <organization/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <seriesInfo name="2017 IEEE 1st International Conference on Fog and Edge Computing" value="(ICFEC)"/>
        <seriesInfo name="DOI" value="10.1109/icfec.2017.18"/>
      </reference>
      <reference anchor="Zhang2">
        <front>
          <title>Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues</title>
          <author initials="J." surname="Zhang" fullname="Jiale Zhang">
            <organization/>
          </author>
          <author initials="B." surname="Chen" fullname="Bing Chen">
            <organization/>
          </author>
          <author initials="Y." surname="Zhao" fullname="Yanchao Zhao">
            <organization/>
          </author>
          <author initials="X." surname="Cheng" fullname="Xiang Cheng">
            <organization/>
          </author>
          <author initials="F." surname="Hu" fullname="Feng Hu">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
        <seriesInfo name="IEEE Access" value="vol. 6, pp. 18209-18237"/>
        <seriesInfo name="DOI" value="10.1109/access.2018.2820162"/>
      </reference>
      <reference anchor="Yates">
        <front>
          <title>The Age of Information: Real-Time Status Updating by Multiple Sources</title>
          <author initials="R." surname="Yates" fullname="Roy D. Yates">
            <organization/>
          </author>
          <author initials="S." surname="Kaul" fullname="Sanjit K. Kaul">
            <organization/>
          </author>
          <date year="2019" month="March"/>
        </front>
        <seriesInfo name="IEEE Transactions on Information Theory" value="vol. 65, no. 3, pp. 1807-1827"/>
        <seriesInfo name="DOI" value="10.1109/tit.2018.2871079"/>
      </reference>
      <reference anchor="Khan">
        <front>
          <title>Edge-Computing-Enabled Smart Cities: A Comprehensive Survey</title>
          <author initials="L." surname="Khan" fullname="Latif U. Khan">
            <organization/>
          </author>
          <author initials="I." surname="Yaqoob" fullname="Ibrar Yaqoob">
            <organization/>
          </author>
          <author initials="N." surname="Tran" fullname="Nguyen H. Tran">
            <organization/>
          </author>
          <author initials="S." surname="Kazmi" fullname="S. M. Ahsan Kazmi">
            <organization/>
          </author>
          <author initials="T." surname="Dang" fullname="Tri Nguyen Dang">
            <organization/>
          </author>
          <author initials="C." surname="Hong" fullname="Choong Seon Hong">
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
        <seriesInfo name="IEEE Internet of Things Journal" value="vol. 7, no. 10, pp. 10200-10232"/>
        <seriesInfo name="DOI" value="10.1109/jiot.2020.2987070"/>
      </reference>
      <reference anchor="RFC7390" target="https://www.rfc-editor.org/info/rfc7390">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <author fullname="A. Rahman" initials="A." role="editor" surname="Rahman">
            <organization/>
          </author>
          <author fullname="E. Dijk" initials="E." role="editor" surname="Dijk">
            <organization/>
          </author>
          <date month="October" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for constrained devices and constrained networks. It is anticipated that constrained devices will often naturally operate in groups (e.g., in a building automation scenario, all lights in a given room may need to be switched on/off as a group). This specification defines how CoAP should be used in a group communication context.  An approach for using CoAP on top of IP multicast is detailed based on existing CoAP functionality as well as new features introduced in this specification.  Also, various use cases and corresponding protocol flows are provided to illustrate important concepts.  Finally, guidance is provided for deployment in various network topologies.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7390"/>
        <seriesInfo name="DOI" value="10.17487/RFC7390"/>
      </reference>
      <reference anchor="I-D.ietf-core-groupcomm-bis" target="https://www.ietf.org/archive/id/draft-ietf-core-groupcomm-bis-08.txt">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <author fullname="Esko Dijk" initials="E." surname="Dijk">
            <organization>IoTconsultancy.nl</organization>
          </author>
          <author fullname="Chonggang Wang" initials="C." surname="Wang">
            <organization>InterDigital</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <date day="11" month="January" year="2023"/>
          <abstract>
            <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-08"/>
      </reference>
      <reference anchor="Murshed">
        <front>
          <title>Machine Learning at the Network Edge: A Survey</title>
          <author initials="M." surname="Murshed" fullname="M. G. Sarwar Murshed">
            <organization/>
          </author>
          <author initials="C." surname="Murphy" fullname="Christopher Murphy">
            <organization/>
          </author>
          <author initials="D." surname="Hou" fullname="Daqing Hou">
            <organization/>
          </author>
          <author initials="N." surname="Khan" fullname="Nazar Khan">
            <organization/>
          </author>
          <author initials="G." surname="Ananthanarayanan" fullname="Ganesh Ananthanarayanan">
            <organization/>
          </author>
          <author initials="F." surname="Hussain" fullname="Faraz Hussain">
            <organization/>
          </author>
          <date year="2022" month="November"/>
        </front>
        <seriesInfo name="ACM Computing Surveys" value="vol. 54, no. 8, pp. 1-37"/>
        <seriesInfo name="DOI" value="10.1145/3469029"/>
      </reference>
      <reference anchor="I-D.sarathchandra-coin-appcentres" target="https://www.ietf.org/archive/id/draft-sarathchandra-coin-appcentres-04.txt">
        <front>
          <title>In-Network Computing for App-Centric Micro-Services</title>
          <author fullname="Dirk Trossen" initials="D." surname="Trossen">
            <organization>Huawei</organization>
          </author>
          <author fullname="Chathura Sarathchandra" initials="C." surname="Sarathchandra">
            <organization>InterDigital Inc.</organization>
          </author>
          <author fullname="Michael Boniface" initials="M." surname="Boniface">
            <organization>University of Southampton</organization>
          </author>
          <date day="26" month="January" year="2021"/>
          <abstract>
            <t>   The application-centric deployment of 'Internet' services has
   increased over the past ten years with many millions of applications
   providing user-centric services, executed on increasingly more
   powerful smartphones that are supported by Internet-based cloud
   services in distributed data centres, the latter mainly provided by
   large scale players such as Google, Amazon and alike. This draft
   outlines a vision for evolving those data centres towards executing
   app-centric micro-services; we dub this evolved data centre as an
   AppCentre. Complemented with the proliferation of such AppCentres at
   the edge of the network, they will allow for such micro-services to
   be distributed across many places of execution, including mobile
   terminals themselves, while specific micro-service chains equal
   today's applications in existing smartphones.

   We outline the key enabling technologies that needs to be provided
   for such evolution to be realized, including references to ongoing
   standardization efforts in key areas.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-sarathchandra-coin-appcentres-04"/>
      </reference>
      <reference anchor="I-D.defoy-t2trg-iot-edge-computing-background" target="https://www.ietf.org/archive/id/draft-defoy-t2trg-iot-edge-computing-background-00.txt">
        <front>
          <title>IoT Edge Computing: Initiatives, Projects and Products</title>
          <author fullname="Xavier de Foy" initials="X." surname="de Foy">
            <organization>InterDigital Communications</organization>
          </author>
          <author fullname="Jungha Hong" initials="J." surname="Hong">
            <organization>ETRI</organization>
          </author>
          <author fullname="Yong-Geun Hong" initials="Y." surname="Hong">
            <organization>ETRI</organization>
          </author>
          <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
            <organization>Huawei Technologies Duesseldorf GmbH</organization>
          </author>
          <author fullname="Eve Schooler" initials="E." surname="Schooler">
            <organization>Intel</organization>
          </author>
          <author fullname="Dirk Kutscher" initials="D." surname="Kutscher">
            <organization>University of Applied Sciences Emden/Leer</organization>
          </author>
          <date day="25" month="May" year="2020"/>
          <abstract>
            <t>   Many IoT applications have requirements that cannot be met by
   the traditional Cloud.  As a result, the IoT is driving the Internet
   toward Edge computing.  This draft reviews initiatives, projects and
   products related to IoT Edge Computing.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-defoy-t2trg-iot-edge-computing-background-00"/>
      </reference>
      <reference anchor="Senel">
        <front>
          <title>EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud</title>
          <author initials="B." surname="Senel" fullname="Berat Can Senel">
            <organization/>
          </author>
          <author initials="M." surname="Mouchet" fullname="Maxime Mouchet">
            <organization/>
          </author>
          <author initials="J." surname="Cappos" fullname="Justin Cappos">
            <organization/>
          </author>
          <author initials="O." surname="Fourmaux" fullname="Olivier Fourmaux">
            <organization/>
          </author>
          <author initials="T." surname="Friedman" fullname="Timur Friedman">
            <organization/>
          </author>
          <author initials="R." surname="McGeer" fullname="Rick McGeer">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459737"/>
      </reference>
      <reference anchor="Stanciu">
        <front>
          <title>Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption</title>
          <author initials="V." surname="Stanciu" fullname="Valeriu-Daniel Stanciu">
            <organization/>
          </author>
          <author initials="M." surname="Steen" fullname="Maarten van Steen">
            <organization/>
          </author>
          <author initials="C." surname="Dobre" fullname="Ciprian Dobre">
            <organization/>
          </author>
          <author initials="A." surname="Peter" fullname="Andreas Peter">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459735"/>
      </reference>
      <reference anchor="Jeffery">
        <front>
          <title>Rearchitecting Kubernetes for the Edge</title>
          <author initials="A." surname="Jeffery" fullname="Andrew Jeffery">
            <organization/>
          </author>
          <author initials="H." surname="Howard" fullname="Heidi Howard">
            <organization/>
          </author>
          <author initials="R." surname="Mortier" fullname="Richard Mortier">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459730"/>
      </reference>
      <reference anchor="Nieke">
        <front>
          <title>Edgedancer: Secure Mobile WebAssembly Services on the Edge</title>
          <author initials="M." surname="Nieke" fullname="Manuel Nieke">
            <organization/>
          </author>
          <author initials="L." surname="Almstedt" fullname="Lennart Almstedt">
            <organization/>
          </author>
          <author initials="R." surname="Kapitza" fullname="Rüdiger Kapitza">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459731"/>
      </reference>
      <reference anchor="Cao">
        <front>
          <title>eCaaS: A Management Framework of Edge Container as a Service for Business Workload</title>
          <author initials="L." surname="Cao" fullname="Lianjie Cao">
            <organization/>
          </author>
          <author initials="A." surname="Merican" fullname="Anu Merican">
            <organization/>
          </author>
          <author initials="D." surname="Tootaghaj" fullname="Diman Zad Tootaghaj">
            <organization/>
          </author>
          <author initials="F." surname="Ahmed" fullname="Faraz Ahmed">
            <organization/>
          </author>
          <author initials="P." surname="Sharma" fullname="Puneet Sharma">
            <organization/>
          </author>
          <author initials="V." surname="Saxena" fullname="Vinay Saxena">
            <organization/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the 4th International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3434770.3459741"/>
      </reference>
      <reference anchor="Larrea">
        <front>
          <title>The serverkernel operating system</title>
          <author initials="J." surname="Larrea" fullname="Jon Larrea">
            <organization/>
          </author>
          <author initials="A." surname="Barbalace" fullname="Antonio Barbalace">
            <organization/>
          </author>
          <date year="2020" month="April"/>
        </front>
        <seriesInfo name="Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and" value="Networking"/>
        <seriesInfo name="DOI" value="10.1145/3378679.3394537"/>
      </reference>
      <reference anchor="Mortazavi" target="https://www.usenix.org/conference/hotedge18/presentation/mortazavi">
        <front>
          <title>Toward Session Consistency for the Edge</title>
          <author initials="S." surname="Hossein Mortazavi">
            <organization/>
          </author>
          <author initials="B." surname="Balasubramanian">
            <organization/>
          </author>
          <author initials="E." surname="de Lara">
            <organization/>
          </author>
          <author initials="S. P." surname="Narayanan">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
        <refcontent>USENIX, Workshop on Hot Topics in Edge Computing (HotEdge 18)</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0001" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=28153">
        <front>
          <title>TR 0001, Use Cases Collection</title>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2018" month="October"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0018" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29334">
        <front>
          <title>TR 0018, Industrial Domain Enablement</title>
          <author initials="C." surname="Lu">
            <organization/>
          </author>
          <author initials="M." surname="Jiang">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0026" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=31410">
        <front>
          <title>TR 0026, Vehicular Domain Enablement</title>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <author initials="V." surname="Kueh">
            <organization/>
          </author>
          <date year="2020" month="January"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0052" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=32633">
        <front>
          <title>TR 0052, Study on Edge and Fog Computing in oneM2M systems</title>
          <author initials="K." surname="Yamamoto">
            <organization/>
          </author>
          <author initials="C." surname="Mladin">
            <organization/>
          </author>
          <date year="2020" month="September"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TS0002" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29274">
        <front>
          <title>TS 0002, Requirements</title>
          <author initials="S." surname="He">
            <organization/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="Chen">
        <front>
          <title>Edge Computing in IoT-Based Manufacturing</title>
          <author initials="B." surname="Chen" fullname="Baotong Chen">
            <organization/>
          </author>
          <author initials="J." surname="Wan" fullname="Jiafu Wan">
            <organization/>
          </author>
          <author initials="A." surname="Celesti" fullname="Antonio Celesti">
            <organization/>
          </author>
          <author initials="D." surname="Li" fullname="Di Li">
            <organization/>
          </author>
          <author initials="H." surname="Abbas" fullname="Haider Abbas">
            <organization/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qin Zhang">
            <organization/>
          </author>
          <date year="2018" month="September"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="vol. 56, no. 9, pp. 103-109"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2018.1701231"/>
      </reference>
      <reference anchor="Jones">
        <front>
          <title>Characterising the Digital Twin: A systematic literature review</title>
          <author initials="D." surname="Jones" fullname="David Jones">
            <organization/>
          </author>
          <author initials="C." surname="Snider" fullname="Chris Snider">
            <organization/>
          </author>
          <author initials="A." surname="Nassehi" fullname="Aydin Nassehi">
            <organization/>
          </author>
          <author initials="J." surname="Yon" fullname="Jason Yon">
            <organization/>
          </author>
          <author initials="B." surname="Hicks" fullname="Ben Hicks">
            <organization/>
          </author>
          <date year="2020" month="May"/>
        </front>
        <seriesInfo name="CIRP Journal of Manufacturing Science and Technology" value="vol. 29, pp. 36-52"/>
        <seriesInfo name="DOI" value="10.1016/j.cirpj.2020.02.002"/>
      </reference>
      <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby">
            <organization/>
          </author>
          <author fullname="K. Hartke" initials="K." surname="Hartke">
            <organization/>
          </author>
          <author fullname="C. Bormann" initials="C." surname="Bormann">
            <organization/>
          </author>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="Cloudlets">
        <front>
          <title>The Case for VM-Based Cloudlets in Mobile Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="M. Satyanarayanan">
            <organization/>
          </author>
          <author initials="P." surname="Bahl" fullname="P. Bahl">
            <organization/>
          </author>
          <author initials="R." surname="Caceres" fullname="R. Caceres">
            <organization/>
          </author>
          <author initials="N." surname="Davies" fullname="N. Davies">
            <organization/>
          </author>
          <date year="2009" month="October"/>
        </front>
        <seriesInfo name="IEEE Pervasive Computing" value="vol. 8, no. 4, pp. 14-23"/>
        <seriesInfo name="DOI" value="10.1109/mprv.2009.82"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
