ABSTRACT
Edge and fog computing applications typically focus on outsourcing computations from static or mobile end user devices towards compute nodes in proximity. However, such applications do not fully exploit the benefits of the edge because the resources of neighboring end user devices are not considered as potential compute nodes. For this reason, we propose complementing edge computing with peer to peer interactions in order to enable the end user devices to communicate with each other and share computations. Peer to peer is a well established communication model that can be used for organizing the available resources based on proximity disregarding their role in the network (i.e., end user device, edge or cloud node). This way, all resources become accessible and computations may be outsourced towards any node. In this paper, we present three edge computing use cases that can benefit from the use of peer to peer interactions. To further motivate the use of peer to peer, we analyze the compatibility with edge computing and the potential impact, and we identify related research directions.
- 2016. Mobile edge computing (MEC): Framework and reference architecture. In GS MEC 003. ETSI.Google Scholar
- Mohammad Aazam, Sherali Zeadally, and Khaled A Harras. 2018. Fog Computing Architecture, Evaluation, and Future Research Directions. IEEE Communications Magazine 56, 5 (2018), 46--52.Google ScholarCross Ref
- Ali Al-Shuwaili and Osvaldo Simeone. 2017. Energy-efficient resource allocation for mobile edge computing-based augmented reality applications. IEEE Wireless Communications Letters 6, 3 (2017), 398--401.Google ScholarCross Ref
- Phil J. Bartie and William A. Mackaness. 2006. Development of a Speech-Based Augmented Reality System to Support Exploration of Cityscape. Transactions in GIS 10, 1 (Jan. 2006), 63--86.Google ScholarCross Ref
- Oladayo Bello, Sherali Zeadally, and Mohamad Badra. 2017. Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT). Ad Hoc Networks 57 (2017), 52--62. Google ScholarDigital Library
- Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments. Springer, 169--186.Google Scholar
- Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Workshop on Mobile Cloud Computing (MCC). ACM, 13--16. Google ScholarDigital Library
- Miguel Castro, Peter Druschel, Y Charlie Hu, and Antony Rowstron. 2003. Topology-aware routing in structured peer-to-peer overlay networks. In Future directions in distributed computing. Springer, 103--107. Google ScholarDigital Library
- Dmitrii Chemodanov, Flavio Esposito, Andrei Sukhov, Prasad Calyam, Huy Trinh, and Zakariya Oraibi. 2019. AGRA: AI-augmented geographic routing approach for IoT-based incident-supporting applications. Future Generation Computer Systems 92 (2019), 1051--1065.Google ScholarDigital Library
- Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112--116. Google ScholarDigital Library
- KE Srinivasa Desikan, Vijeth J Kotagi, and C Siva Ram Murthy. 2018. Smart at Right Price: A Cost Efficient Topology Construction for Fog Computing Enabled IoT Networks in Smart Cities. In 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 1--7.Google ScholarCross Ref
- Gerhard Fohler, Gautam Gala, Daniel Gracia Pérez, and Claire Pagetti. 2018. Evaluation of DREAMS resource management solutions on a mixed-critical demonstrator. In 9th European Congress on Embedded Real Time Software and Systems (ERTS).Google Scholar
- Pedro Garcia Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. ACM SIGCOMM Computer Communication Review 45, 5 (2015), 37--42. Google ScholarDigital Library
- Gabriela Gheorghe, Renato Lo Cigno, and Alberto Montresor. 2011. Security and privacy issues in P2P streaming systems: A survey. Peer-to-Peer Networking and Applications 4, 2 (2011), 75--91.Google ScholarCross Ref
- Lu Hou, Shaohang Zhao, Xiong Xiong, Kan Zheng, Periklis Chatzimisios, M Shamim Hossain, and Wei Xiang. 2016. Internet of things cloud: Architecture and implementation. IEEE Communications Magazine 54, 12 (2016), 32--39.Google ScholarCross Ref
- Pengfei Hu, Sahraoui Dhelim, Huansheng Ning, and Tie Qiu. 2017. Survey on fog computing: architecture, key technologies, applications and open issues. Journal of Network and Computer Applications 98 (2017), 27--42. Google ScholarDigital Library
- Wenlu Hu, Ying Gao, Kiryong Ha, Junjue Wang, Brandon Amos, Zhuo Chen, Padmanabhan Pillai, and Mahadev Satyanarayanan. 2016. Quantifying the impact of edge computing on mobile applications. In Asia-Pacific Workshop on Systems (SIGOPS). ACM, 5. Google ScholarDigital Library
- Maziar Janbeglou and Nevil Brownlee. 2016. Overudp: Tunneling transport layer protocols in udp for p2p application of ipv4. In International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 325--330.Google ScholarCross Ref
- Vasileios Karagiannis, Periklis Chatzimisios, Francisco Vazquez-Gallego, and Jesus Alonso-Zarate. 2015. A survey on application layer protocols for the internet of things. ICAS Transaction on IoT and Cloud Computing 3, 1 (2015), 11--17.Google Scholar
- Vasileios Karagiannis and Apostolos Papageorgiou. 2017. Network-integrated edge computing orchestrator for application placement. In International Conference on Network and Service Management (CNSM). IEEE, 1--5.Google ScholarCross Ref
- Chris D Kounavis, Anna E Kasimati, and Efpraxia D Zamani. 2012. Enhancing the tourism experience through mobile augmented reality: Challenges and prospects. International Journal of Engineering Business Management 4 (2012), 10.Google ScholarCross Ref
- Adrien Lebre, Jonathan Pastor, Anthony Simonet, and Frédéric Desprez. 2017. Revising OpenStack to operate fog/edge computing infrastructures. In Cloud Engineering (IC2E), 2017 IEEE International Conference on. IEEE, 138--148.Google Scholar
- Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, and Steven Lim. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials 7, 2 (2005), 72--93. Google ScholarDigital Library
- Dan Radu, Adrian Cretu, Camelia Avram, Adina Astilean, and Benoît Parrein. 2018. Video content transmission in a public safety system model based on flying Ad-hoc networks. In 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 1--4.Google ScholarCross Ref
- Ivan Rodero, Francesc Guim, Julita Corbalan, Liana Fong, and S Masoud Sadjadi. 2010. Grid broker selection strategies using aggregated resource information. Future Generation Computer Systems 26, 1 (2010), 72--86. Google ScholarDigital Library
- Arijit Roy, Chandana Roy, Sudip Misra, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. 2018. Care: criticality-aware data transmission in cps-based healthcare systems. In 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 1--6.Google ScholarCross Ref
- A.C. Sankaranarayanan, A. Veeraraghavan, and R. Chellappa. 2008. Object Detection, Tracking and Recognition for Multiple Smart Cameras. Proc. IEEE 96, 10 (Oct. 2008), 1606--1624.Google Scholar
- Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30--39. Google ScholarDigital Library
- Mahadev Satyanarayanan, Rolf Schuster, Maria Ebling, Gerhard Fettweis, Hannu Flinck, Kaustubh Joshi, and Krishan Sabnani. 2015. An open ecosystem for mobile-cloud convergence. IEEE Communications Magazine 53, 3 (2015), 63--70.Google ScholarCross Ref
- Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637--646.Google ScholarCross Ref
- Weisong Shi and Schahram Dustdar. 2016. The promise of edge computing. IEEE Computer 49, 5 (2016), 78--81.Google ScholarDigital Library
- Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2017. Performance evaluation of single-tier and two-tier cloudlet assisted applications. In International Conference on Communications Workshops (ICC Workshops). IEEE, 302--307.Google ScholarCross Ref
- Daniel Stutzbach and Reza Rejaie. 2006. Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM, 189--202. Google ScholarDigital Library
- Daniel Stutzbach, Reza Rejaie, and Subhabrata Sen. 2008. Characterizing unstructured overlay topologies in modern P2P file-sharing systems. IEEE Transactions on Networking (ToN) 16, 2 (2008), 267--280. Google ScholarDigital Library
- Genc Tato, Marin Bertier, and Cédric Tedeschi. 2017. Designing Overlay Networks for Decentralized Clouds. In Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, 391--396.Google ScholarCross Ref
- Luis M Vaquero and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review 44, 5 (2014), 27--32. Google ScholarDigital Library
- Blesson Varghese, Nan Wang, Sakil Barbhuiya, Peter Kilpatrick, and Dimitrios S Nikolopoulos. 2016. Challenges and opportunities in edge computing. arXiv preprint arXiv:1609.01967 (2016).Google Scholar
- Prateeksha Varshney and Yogesh Simmhan. 2017. Demystifying fog computing: Characterizing architectures, applications and abstractions. In International Conference on Fog and Edge Computing (ICFEC). IEEE, 115--124.Google ScholarCross Ref
- Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li. 2015. Fog computing: Platform and applications. In Workshop on Hot Topics in Web Systems and Technologies (HotWeb). IEEE, 73--78. Google ScholarDigital Library
- Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2018. A survey on the edge computing for the Internet of Things. IEEE access 6 (2018), 6900--6919.Google Scholar
Index Terms
- Edge computing with peer to peer interactions: use cases and impact
Recommendations
Efficient resource discovery in self-organized unstructured peer-to-peer networks
In unstructured peer-to-peer (P2P) networks, two autonomous peer nodes can be connected if users in those nodes are interested in each other's data. Owing to the similarity between P2P networks and social networks, where peer nodes can be regarded as ...
File Diffusion Time as Function of Peer Speed Distribution in BitTorrent-Like Networks with Super-Seed Mode
ICNC '11: Proceedings of the 2011 Second International Conference on Networking and ComputingIn recent years, P2P technology is of practical use. P2P file sharing software is one of the most popular applications which use the P2P technology. In Bit Torrent, peers exchange partial files called pieces to get a complete file. Super-seed Mode is ...
Comments