(PDF) Comparison of Edge Computing Implementations - Fog Computing, Cloudlet and Mobile Edge Computing
(PDF) Comparison of Edge Computing Implementations - Fog Computing, Cloudlet and Mobile Edge Computing
research
bers
cations
rojects
—When it comes to storage and computation of large while provisioning resources to an applicat
ta, Cloud Computing has acted as the de-facto solution Moreover, there is also a need for mobility
past decade. However, with the massive growth in agile nature of the end devices in various ap
and mobile devices coupled with technologies like
f Things (IoT), V2X Communications, Augmented emerging technologies. In parallel, the num
R), the focus has shifted towards gaining real-time devices is estimated to reach 30-50 Bill
along with support for context-awareness and mobility. routing of massive scales of network traffi
delays induced on the Wide Area Network (WAN) and can prove to be a bottleneck degrading the
nostic provisioning of resources on the cloud, there is turn the Quality of Service (QoS) and Qua
bring the features of the cloud closer to the consumer
his led to the birth of the Edge Computing paradigm (QoE). The vast number of requests to the
s to provide context aware storage and distributed to the operation of the DCNs at a high duty
at the edge of the networks. In this paper, we discuss in emissions of harmful greenhouse gases
different implementations of Edge Computing namely effect on the environment.
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 2/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
uting,
SeeCloudlet
all › andSee
Mobile
all › Edge Computing
See all › in based
detail The Edge Computing (EC) attempts to
re their features. We define a set of parameters Download citation
scribed challenges. The EC Share
leverages the Download full-text PDF
ne 82
of Citations 29 References
these implementations can be 2chosen
Figuresoptimally
rticular use-case or application and present a decision cessing capacities of a large number of
e selection of the optimal implementation. nected to the Internet deployed for the p
rms—Cloud Computing; Cloudlet; Edge Computing; an intermediate layer between the end devi
uting; IoT; Mobile Edge Computing. With the presence of these ”Edge devices
load at the data centers are reduced by han
I. INTRODUCTION
requests directed to the cloud, locally, wh
ent growth in services and applications leveraging intervention from the cloud. This in turn, r
et has contributed to a steep rise in data storage in resolving the requests and allows real-t
sing requirements. They are diverse in terms of the subset of requests. Edge devices also suppo
required by different applications and thus, often the abundant availability and geo-distribute
or-made solutions. Cloud Computing provides as a The Edge layer between the end devi
lution in in this context by leveraging the advance- are implemented in different ways in ter
omputing and network technologies. The backbone which act as the intermediate edge nodes, t
ud Computing paradigm is based on the data centers protocols and networks used by the Edg
capable of handling storage and processing of large the services offered by the Edge layer. T
data. These data centers are often connected with of the edge layer can be classified into th
over optical networks to form data center networks Edge Computing (MEC), Fog Computing
ppearing as a singular resource to the end user, with Computing (CC). Fog Computing presents
y communication among the data centers. However, leveraging devices like M2M gateways an
f Things (IoT) systems have presented a new set These are called Fog Computing Nodes (F
ments the well established CC based solutions. to compute and store data from end devi
ns especially connected vehicles require near real- forwarding to the Cloud. On the other han
ssing of sensor data to take decisions and perform deployment of intermediate nodes with stor
Even though the communication inside the DCNs capabilities in the base stations of cellu
le for low-latency communication, the latency of offering Cloud Computing capabilities insi
ation between the end devices and the DCNs prove Network (RAN). The Cloudlets are based on
tleneck. This owes to the lack of location awareness with capacities similar to a data center bu
873-0/17/$31.00 2017
c IEEE present in logical vicinity to the consume
MEC nodes to run applications in containers offering the end users and allocates resources in
s-a-Service (PaaS). requirements of the requests.
rayanan in his work [22] proposes use cases for 2) Mobile Edge Computing: MEC can
Computing in Vehicle to Vehicle (V2V) communica- implementation of Edge Computing to br
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 4/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
ng different
See all › architectures
See all ›for different
Seeuse-cases.
all › For and storage capacities to the edge of the n
n the case of an on-vehicle video game application, Download
Radio Access citation
Network Sharelatency an Download full-text PDF
to reduce
82 Citations 29 References 2 Figures
et is more suitably co-located with the device, also awareness. The MEC nodes or servers are
g on-device processing from the sensor data while, with the Radio Network Controller or a m
oring of road and traffic conditions an ad-hoc set The servers run multiple instances of ME
ts deployed in an area appears to be more suitable. the capabilities to perform computation an
also discusses the suitability of Cloudlet Computing tualized interface. The MEC hosts are overl
text of handling privacy and security measures as a Edge Orchestrator which handles informati
p between end-devices and the cloud. The authors of offered by each host, the resources availab
ss the role of Cloudlets in improving crowd-sourcing topology while also managing the Mobile
ns in terms of scaling and pre-processing of massive The MEC servers offer real time informati
data generated from crowd-sourcing applications. itself including the load and capacity of
ve studies help us extract the important trends in the also offering information on the end device
nts of the emerging EC applications and we discuss servers including their location and networ
ds in the following sections. 3) Cloudlet Computing: A Cloudlet can
trusted cluster of computers, well connect
COMPARISON AMONG EDGE COMPUTING with resources available to use for nearby m
IMPLEMENTATIONS
A Cloudlet can be treated as ”data center
ection, we address the gap in existing literature by a virtual machine capable of provisioning
a detailed analysis of the implementations in the devices and users in real time over a WL
subsections. In the first part of the section we look services are Cloudlets are provided over a o
itecture of the implementations individually while in high bandwidth, thus offering low latency fo
part we study the work flow through the different architecture proposed in [11] for Cloudlets
the architecture while handling requests from the layers, the component layer,the node laye
in the final part, we compare the Edge Computing layer. The component layer offers a set of s
ations and present our study. ing interfaces to the higher layers overloo
tion Environment. One or multiple Executi
lementation architectures running on top of an OS form a Node, m
mpare the three EC implementations in terms of Agent. A group of co-located nodes form
ecture they follow, the function and location of managed by a Cloudlet Agent. Satyanaran
s serving as the intermediate layer between the end an architecture for cognitive assistance ap
d the cloud, their offered services as well as their which involves a primary virtual machin
lications in the following subsection. The N-tier cognitive functionalities offered by other v
e involving the cloud platforms, the end devices and the Cloudlet to serve a request. The data
nt implementations of Edge Computing is portrayed VMs is gathered on a user guidance VM wh
to the end user.
Computing: The Fog Computing implementation is
lized Computing infrastructure based on Fog Com- B. EC implementation request handling
des (FCNs) placed at any point of the architecture In this section, we study how requests
he end devices and the cloud. The FCNs are hetero- different Edge Computing implementation
n nature and thus can be based on different kinds consider a use-case which requires offload
ts including but not limited to routers, switches, tasks to the Edge, for example, an IoT base
nts, IoT gateways as well as set-top boxes. The where processing of data from car sensors
eity of FCNs paves the way for supporting devices at processing of the data is offloaded to t
rotocol layers as well as support for non-IP based Computing implementations.
hnologies to communicate between the FCN and 1) Fog Computing: In the Fog Computin
vice. The heterogeneity of the nodes is hidden from Fog Orchestrator presides over the underlyi
vices by exposing a uniform Fog abstraction layer municating with the nodes through the fun
oses a set of functions to perform resource allocation the Fog abstraction layer. The requests from
oring, security and device management along with at the Fog Orchestrator with a set of require
d compute services. These functions are utilized by policies. The required policy may include pa
e Orchestration Layer which receives requests from minimal Fog node configuration, load balan
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 5/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
TABLE I
C OMPARISON OF E DGE C OMPUTING IMPLEMENTATIONS
Orchestrator matches the policies with the services In terms of proximity to the edge, in case
y each of the nodes and returns an ordered list of the FCN may not be the first hop access
erms of suitability against the requested policy. The device due the leveraging of legacy devi
ch are most suitable are chosen based on availability. example, the first router connected to the e
le Edge Computing: The MEC servers co-located be resourceful enough to run an FCN frame
ase stations, receive the requests at the Mobile Edge closest FCN may be present multiple hop
or from the end user. The orchestrator maintains a to the support for inter-node communicatio
applications that are running on the underlying ME Computing as well. However, for Cloudlet
receives updates on the available resources from the Computing, the devices connect directly to
rm Manager. If an application is already running, the Fi and mobile network at the base station
redirected to the application while if an application Computing leverages gateways as devices fo
running state but is supported by the platform, the support for non-IP based protocols like BLE
n is instantiated if resources are available and the allows Fog Computing to connect to a w
accepted. Otherwise, the request is passed on to be devices and also offer protocol translation.
the cloud passing through the core of the network. If we analyze the request handling m
dlet Computing: In case of Cloudlet Computing, services offered by each of these implement
et Agent overlooks the Cloudlets and the underlying a similar hierarchical approach, where the
Cloudlet Agent communicates with the underlying entity overlooking the underlying nodes wh
ts through the Node Agent and the Execution Envi- with them to gather information on the r
Policy violations in the components are passed on to availability. However, the diversity and he
et Agent from the components hierarchically. This the Fog devices invoke the need for an abst
Cloudlet Agent to make an optimized choice for in the other implementations it is not necess
ing node when a request is received such that more devices are used as nodes. MEC, on the oth
ueries are handled by nodes with higher processing advantage of having fine grained informatio
The Cloudlet Agent can also provision and allocate location and network load for improved con
urces by instantiating new VMs if necessary to Cloudlets, the data stored and processed on
received requests. a soft state, i.e. the data is already backe
and is updated once the processing is finis
rison advantage offered by Cloudlets is that the
a fresh Virtual Machine on the Cloudlet ev
n the features mentioned in the previous subsection, Cloudlet performs a pre-use customized res
t a comparative study of the implementations in and a post-use cleanup by backing up the p
ince the Fog Computing implementation proposes the cloud
ce of FCNs anywhere between the end devices and
DCNs, Fog Computing offers more flexibility in IV. USE C ASE BASED DECISION MA
e of devices for using them as FCNs. However, The Edge Computing paradigm offers s
Ns leverage legacy devices by adding storage and variety of end devices, applications and u
to them, the computation and storage capacities These use cases and applications have
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 6/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
See allthan
y lesser › thatSee
of allCloudlets
› SeeMobile
and all › Edge requirements and trade-offs which determin
n the82other hand, due to the requirement of dedicated Download
Edge Computing citation Share is suitabl
implementations Download full-text PDF
Citations 29 References 2 Figures
r Mobile Edge Computing and Cloudlet Computing In this section, we define a taxonomy to ev
ation of these implementations are slower than that case and build a decision tree based on the
mputing. However, these devices can be reused as available implementations to make an optim
servers as well as Cloudlets. implementations of Edge Computing.
Load more
References (29)
BIoT application is detailed in [70], where it is presented the architecture of a blockchain-based platform for
ion medicine. It is also worth mentioning the work described in [71], which presents a generic smart
makes use of IoT devices, cloud and fog computing [72] , a blockchain, Tor [73] and message brokers. IoT
lso be enhanced by blockchain technology. ...
SBCs are the different versions of Raspberry Pi [84] or Beagle Bone [85]. Fog computing is actually
edge computing [72] , which has recently been presented as a valid architecture for supporting blockchain
G IoT applications [86]. As it can be observed in Figure 5, in the Edge Computing Layer, besides fog
udlet, which in practice consists in one or more high-end computers that act like a reduced version of a cloud.
· Surendar Singh
ues occur because SecLaaS allows investigators to access and read user logs. Log-chain technology
quentially accumulating log entries, which can cause performance degradation during large log-entry creation
vide multiple log sources, such as a mobile edge cloud [12][13] [14] [15][16] and fog computing [13,17].
e [8] has a low probability of false positives, which are inherent in search failure. ...
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 8/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
g Assuring-Secrecy
See all › Scheme
See all › for DigitalSee
Forensics
all ›
Download citation Share Download full-text PDF
82 Citations 29 References 2 Figures
le
am Huh
he network infrastructure components. The nodes close to the users have a smaller computational capacity,
utational capacity that MEC servers, but the capacity increases towards the cloud in a hierarchy [13] , [12],
e data storage in Cloud is studied by [4], where a review of acquisition, management, processing and mining
resented. The authors of [8] discuss a comparison of Edge computing implementations, Fog computing,
dge computing. The focus is also on a comparative analysis of the three implementations together with the
that affect nodes communication (e.g., physical proximity, access mediums, context awareness, power
tion time). ...
een a lot of discussions about Fog computing or Fog networks, which may lead to some confusion regarding
he term [4] . A brief history shows that the term was first used by Cisco Systems, Inc. in describing the
Cloud towards the edge of the network [5], of which has seen wide adoption of the concept. ...
eco Ventura
s includes smart city devices, smart city alarm devices, and privacy in smart city. The privacy in smart city
acy objectives, context privacy and content privacy in the process of interactions or interoperations, which can
gy by specifying two sub-classes, Data TABLE 1: Comparison between fog computing, multi-access edge
t computing [25] . privacy and Privacy Rules. ...
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_edg… 9/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
r of the two methods took joint consideration of energy consumption and transmission delay. In the realm of
25] , Dolui et al. discussed and compared the multiple features of the novel paradigms, including fog, cloudlet
ent and delay-aware offloading scheme based on device to device collaboration in mobile edge
N SYST
ohammed Mansoor · Asmiza Abdul Sani
Show more
Recommendations
Discover more publications, questions and projects in Fog Computing
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_ed… 10/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
AGILE (Adaptive Gateways for dIverse muLtiple Environments) builds a modular hardware and software gateway for the Internet of
Things with support for protocol interoperability, device and data man ... [more]
View project
Project
AGILE: Adaptive and Modular Gateway for IoT
Koustabh Dolui · Csaba Kiraly · Alexander Felfernig · [...] · Fabio Antonelli
View project
Project
DataTweet
Soumya Kanti Datta
View project
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_ed… 11/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
Cooperative intelligent transport system (C-ITS) applications rely on knowledge of the geographical positions of vehicles.
Unfortunately, satellite-based positioning systems (e.g., GPS and Galileo) ... [more]
View project
Article
The Random Trip Model, Part II: Stationary Regime and Perfect Simulation1
Jean-Yves Le Boudec · Milan Vojnovic
Abstract— In part I, we defined the random trip class of mobility models, and showed that a necessary and sufficient condition for
existence (and convergence to) a stationary regime is that the mean,trip duration is finite. In this part, using Palm calculus, we
establish properties of the stationary regime for the examples considered in the first part, when this condition holds. Then we,provide
... [Show full abstract]
Read more
Implementation of a Remote Mobile Thin-Client Lab Solution Incorporating Virtual Machine-based Techn...
October 2014
Charles J Lesko
This effort describes the background, design, implementation, and early impacts of fielding a remote mobile thin-client lab solution to
support online course delivery to remote students. Specifically, the effort focuses on the incorporation of virtual machine-based
technologies to provide a flexible operating environment for remote online students to interact in while minimizing the need for a ...
[Show full abstract]
View full-text
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_ed… 12/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
Proposing a novel adaptive rate control algorithm for application to forward link of high rate packe...
December 2006
X. Wen · H. Zhang · J. Xu
IS-856 standards stipulates minimum performance requirements that HRPD mobile terminal must satisfy. We now propose a novel
adaptive control algorithm that appears to be a good way of meeting these minimum requirements. We explain our novel algorithm in
detail. Adaptive rate control algorithm is presented including the fixed margin data rate selection method, optimal rate control
algorithm, and ... [Show full abstract]
Read more
Article
Y. Lu · D. Qian · B. Xu · L. Wang
In order to solve the problems such as low performance, security limitation, and deployment-difficulty of new protocols in
implementing the basic mobile IP protocol, an extended mobile IP protocol is implemented on an active network prototype-Softnet.
The Softnet has the feature of dynamic loading of the mobile agents that dynamically extends functions of the active node. Routing
tables for the ... [Show full abstract]
Read more
Discover more
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_ed… 13/14
10/7/2019 (PDF) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing
https://www.researchgate.net/publication/319284011_Comparison_of_edge_computing_implementations_Fog_computing_cloudlet_and_mobile_ed… 14/14