skip to main content
10.1145/3313150.3313226acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesiot-fogConference Proceedingsconference-collections
research-article

Edge computing with peer to peer interactions: use cases and impact

Published:15 April 2019Publication History

ABSTRACT

Edge and fog computing applications typically focus on outsourcing computations from static or mobile end user devices towards compute nodes in proximity. However, such applications do not fully exploit the benefits of the edge because the resources of neighboring end user devices are not considered as potential compute nodes. For this reason, we propose complementing edge computing with peer to peer interactions in order to enable the end user devices to communicate with each other and share computations. Peer to peer is a well established communication model that can be used for organizing the available resources based on proximity disregarding their role in the network (i.e., end user device, edge or cloud node). This way, all resources become accessible and computations may be outsourced towards any node. In this paper, we present three edge computing use cases that can benefit from the use of peer to peer interactions. To further motivate the use of peer to peer, we analyze the compatibility with edge computing and the potential impact, and we identify related research directions.

References

  1. 2016. Mobile edge computing (MEC): Framework and reference architecture. In GS MEC 003. ETSI.Google ScholarGoogle Scholar
  2. Mohammad Aazam, Sherali Zeadally, and Khaled A Harras. 2018. Fog Computing Architecture, Evaluation, and Future Research Directions. IEEE Communications Magazine 56, 5 (2018), 46--52.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ali Al-Shuwaili and Osvaldo Simeone. 2017. Energy-efficient resource allocation for mobile edge computing-based augmented reality applications. IEEE Wireless Communications Letters 6, 3 (2017), 398--401.Google ScholarGoogle ScholarCross RefCross Ref
  4. Phil J. Bartie and William A. Mackaness. 2006. Development of a Speech-Based Augmented Reality System to Support Exploration of Cityscape. Transactions in GIS 10, 1 (Jan. 2006), 63--86.Google ScholarGoogle ScholarCross RefCross Ref
  5. Oladayo Bello, Sherali Zeadally, and Mohamad Badra. 2017. Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT). Ad Hoc Networks 57 (2017), 52--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments. Springer, 169--186.Google ScholarGoogle Scholar
  7. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Workshop on Mobile Cloud Computing (MCC). ACM, 13--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Miguel Castro, Peter Druschel, Y Charlie Hu, and Antony Rowstron. 2003. Topology-aware routing in structured peer-to-peer overlay networks. In Future directions in distributed computing. Springer, 103--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dmitrii Chemodanov, Flavio Esposito, Andrei Sukhov, Prasad Calyam, Huy Trinh, and Zakariya Oraibi. 2019. AGRA: AI-augmented geographic routing approach for IoT-based incident-supporting applications. Future Generation Computer Systems 92 (2019), 1051--1065.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. KE Srinivasa Desikan, Vijeth J Kotagi, and C Siva Ram Murthy. 2018. Smart at Right Price: A Cost Efficient Topology Construction for Fog Computing Enabled IoT Networks in Smart Cities. In 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  12. Gerhard Fohler, Gautam Gala, Daniel Gracia Pérez, and Claire Pagetti. 2018. Evaluation of DREAMS resource management solutions on a mixed-critical demonstrator. In 9th European Congress on Embedded Real Time Software and Systems (ERTS).Google ScholarGoogle Scholar
  13. Pedro Garcia Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. ACM SIGCOMM Computer Communication Review 45, 5 (2015), 37--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gabriela Gheorghe, Renato Lo Cigno, and Alberto Montresor. 2011. Security and privacy issues in P2P streaming systems: A survey. Peer-to-Peer Networking and Applications 4, 2 (2011), 75--91.Google ScholarGoogle ScholarCross RefCross Ref
  15. Lu Hou, Shaohang Zhao, Xiong Xiong, Kan Zheng, Periklis Chatzimisios, M Shamim Hossain, and Wei Xiang. 2016. Internet of things cloud: Architecture and implementation. IEEE Communications Magazine 54, 12 (2016), 32--39.Google ScholarGoogle ScholarCross RefCross Ref
  16. Pengfei Hu, Sahraoui Dhelim, Huansheng Ning, and Tie Qiu. 2017. Survey on fog computing: architecture, key technologies, applications and open issues. Journal of Network and Computer Applications 98 (2017), 27--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wenlu Hu, Ying Gao, Kiryong Ha, Junjue Wang, Brandon Amos, Zhuo Chen, Padmanabhan Pillai, and Mahadev Satyanarayanan. 2016. Quantifying the impact of edge computing on mobile applications. In Asia-Pacific Workshop on Systems (SIGOPS). ACM, 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Maziar Janbeglou and Nevil Brownlee. 2016. Overudp: Tunneling transport layer protocols in udp for p2p application of ipv4. In International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 325--330.Google ScholarGoogle ScholarCross RefCross Ref
  19. Vasileios Karagiannis, Periklis Chatzimisios, Francisco Vazquez-Gallego, and Jesus Alonso-Zarate. 2015. A survey on application layer protocols for the internet of things. ICAS Transaction on IoT and Cloud Computing 3, 1 (2015), 11--17.Google ScholarGoogle Scholar
  20. Vasileios Karagiannis and Apostolos Papageorgiou. 2017. Network-integrated edge computing orchestrator for application placement. In International Conference on Network and Service Management (CNSM). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  21. Chris D Kounavis, Anna E Kasimati, and Efpraxia D Zamani. 2012. Enhancing the tourism experience through mobile augmented reality: Challenges and prospects. International Journal of Engineering Business Management 4 (2012), 10.Google ScholarGoogle ScholarCross RefCross Ref
  22. Adrien Lebre, Jonathan Pastor, Anthony Simonet, and Frédéric Desprez. 2017. Revising OpenStack to operate fog/edge computing infrastructures. In Cloud Engineering (IC2E), 2017 IEEE International Conference on. IEEE, 138--148.Google ScholarGoogle Scholar
  23. Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, and Steven Lim. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials 7, 2 (2005), 72--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Dan Radu, Adrian Cretu, Camelia Avram, Adina Astilean, and Benoît Parrein. 2018. Video content transmission in a public safety system model based on flying Ad-hoc networks. In 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  25. Ivan Rodero, Francesc Guim, Julita Corbalan, Liana Fong, and S Masoud Sadjadi. 2010. Grid broker selection strategies using aggregated resource information. Future Generation Computer Systems 26, 1 (2010), 72--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Arijit Roy, Chandana Roy, Sudip Misra, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. 2018. Care: criticality-aware data transmission in cps-based healthcare systems. In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  27. A.C. Sankaranarayanan, A. Veeraraghavan, and R. Chellappa. 2008. Object Detection, Tracking and Recognition for Multiple Smart Cameras. Proc. IEEE 96, 10 (Oct. 2008), 1606--1624.Google ScholarGoogle Scholar
  28. Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mahadev Satyanarayanan, Rolf Schuster, Maria Ebling, Gerhard Fettweis, Hannu Flinck, Kaustubh Joshi, and Krishan Sabnani. 2015. An open ecosystem for mobile-cloud convergence. IEEE Communications Magazine 53, 3 (2015), 63--70.Google ScholarGoogle ScholarCross RefCross Ref
  30. Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637--646.Google ScholarGoogle ScholarCross RefCross Ref
  31. Weisong Shi and Schahram Dustdar. 2016. The promise of edge computing. IEEE Computer 49, 5 (2016), 78--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2017. Performance evaluation of single-tier and two-tier cloudlet assisted applications. In International Conference on Communications Workshops (ICC Workshops). IEEE, 302--307.Google ScholarGoogle ScholarCross RefCross Ref
  33. Daniel Stutzbach and Reza Rejaie. 2006. Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM, 189--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Daniel Stutzbach, Reza Rejaie, and Subhabrata Sen. 2008. Characterizing unstructured overlay topologies in modern P2P file-sharing systems. IEEE Transactions on Networking (ToN) 16, 2 (2008), 267--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Genc Tato, Marin Bertier, and Cédric Tedeschi. 2017. Designing Overlay Networks for Decentralized Clouds. In Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, 391--396.Google ScholarGoogle ScholarCross RefCross Ref
  36. Luis M Vaquero and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review 44, 5 (2014), 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Blesson Varghese, Nan Wang, Sakil Barbhuiya, Peter Kilpatrick, and Dimitrios S Nikolopoulos. 2016. Challenges and opportunities in edge computing. arXiv preprint arXiv:1609.01967 (2016).Google ScholarGoogle Scholar
  38. Prateeksha Varshney and Yogesh Simmhan. 2017. Demystifying fog computing: Characterizing architectures, applications and abstractions. In International Conference on Fog and Edge Computing (ICFEC). IEEE, 115--124.Google ScholarGoogle ScholarCross RefCross Ref
  39. Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li. 2015. Fog computing: Platform and applications. In Workshop on Hot Topics in Web Systems and Technologies (HotWeb). IEEE, 73--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2018. A survey on the edge computing for the Internet of Things. IEEE access 6 (2018), 6900--6919.Google ScholarGoogle Scholar

Index Terms

  1. Edge computing with peer to peer interactions: use cases and impact

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IoT-Fog '19: Proceedings of the Workshop on Fog Computing and the IoT
      April 2019
      70 pages
      ISBN:9781450366984
      DOI:10.1145/3313150

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 April 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader