Mobile Edge Computing


Book Description

This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.




Mobile Edge Computing


Book Description

This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.




Edge Computing


Book Description

In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.




Mobile Edge Computing


Book Description

Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC. This book is targeted for graduate students, researchers, developers, and service providers interested in learning about the state-of-the-art in MEC technologies, innovative applications, and future research directions.




Fundamental and Supportive Technologies for 5G Mobile Networks


Book Description

Mobile wireless communication systems have affected every aspect of life. By providing seamless connectivity, these systems enable almost all the smart devices in the world to communicate with high speed throughput and extremely low latency. The next generation of cellular mobile communications, 5G, aims to support the tremendous growth of interconnected things/devices (i.e., internet of things [IoT]) using the current technologies and extending them to be used in higher frequencies to cope with the huge number of different devices. In addition, 5G will provide massive capacity, high throughput, lower end-to-end delay, green communication, cost reduction, and extended coverage area. Fundamental and Supportive Technologies for 5G Mobile Networks provides detailed research on technologies used in 5G, their benefits, practical designs, and recent challenges and focuses on future applications that could exploit 5G network benefits. The content within this publication examines cellular communication, data transmission, and high-speed communication. It is designed for network analysts, IT specialists, industry professionals, software engineers, researchers, academicians, students, and scientists.




Algorithms, Methods, and Applications in Mobile Computing and Communications


Book Description

The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the opportunities, there exist constraints, challenges, and complexities in realizing the full potential of mobile computing, requiring research and experimentation. Algorithms, Methods, and Applications in Mobile Computing and Communications is a critical scholarly publication that examines the various aspects of mobile computing and communications from engineering, business, and organizational perspectives. The book details current research involving mobility challenges that hinder service applicability, mobile money transfer services and anomaly detection, and mobile fog environments. As a resource rich in information about mobile devices, wireless broadcast databases, and machine communications, it is an ideal source for computer scientists, IT specialists, service providers, information technology professionals, academicians, and researchers interested in the field of mobile computing.




Multi-access Edge Computing: Software Development at the Network Edge


Book Description

The textbook covers the main aspects of Edge Computing, from a thorough look at the technology to the standards and industry associations working in the field. The book is conceived as a textbook for graduate students but also functions as a working guide for developers, engineers, and researchers. The book aims not only at providing a comprehensive technology and standard reference overview for students, but also useful research insights and practical exercises for edge software developers and investigators in the area (and for students looking to apply their skills). A particular emphasis is given Multi-access Edge Computing (MEC) as defined in European Telecommunications Standards Institute (ETSI), in relationship with other standard organizations like 3GPP, thus in alignment with the recent industry efforts to produce harmonized standards for edge computing leveraging both ETSI ISG MEC and 3GPP specifications. Practical examples of Edge Computing implementation from industry groups, associations, companies and edge developers, complete the book and make it useful for students entering the field. The book includes exercises, examples, and quizzes throughout.




Mobile Edge Artificial Intelligence


Book Description

Mobile Edge Artificial Intelligence: Opportunities and Challenges presents recent advances in wireless technologies and nonconvex optimization techniques for designing efficient edge AI systems. The book includes comprehensive coverage on modeling, algorithm design and theoretical analysis. Through typical examples, the powerfulness of this set of systems and algorithms is demonstrated, along with their abilities to make low-latency, reliable and private intelligent decisions at network edge. With the availability of massive datasets, high performance computing platforms, sophisticated algorithms and software toolkits, AI has achieved remarkable success in many application domains. As such, intelligent wireless networks will be designed to leverage advanced wireless communications and mobile computing technologies to support AI-enabled applications at various edge mobile devices with limited communication, computation, hardware and energy resources. Presents advanced key enabling techniques, including model compression, wireless MapReduce and wireless cooperative transmission Provides advanced 6G wireless techniques, including over-the-air computation and reconfigurable intelligent surface Includes principles for designing communication-efficient edge inference systems, communication-efficient training systems, and communication-efficient optimization algorithms for edge machine learning




Fog/Edge Computing For Security, Privacy, and Applications


Book Description

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.




Edge Computing


Book Description

The book aims to focus only on the 'edge computing' paradigm - as opposed to other similar disciplines such as fog computing - due to its unique characteristics where heterogeneous devices can be equipped with decision-making processes and automation procedures to carry out applications (mostly) across widely geographically distributed areas. The book is sectioned into three parts (models, technologies and applications) to reflect complementary viewpoints and shed light onto various aspect of edge computing platforms. The first part (models) serves as an introductory section to differentiate edge computing from its fairly close/similar paradigms such as fog computing, multi-access edge computing and mobile cloud computing. It then highlights various theoretical models through which edge computing systems could be mathematically expressed and their relevant technological problems could be systematically solved or optimized. The second part (technologies) focuses on different technologies (virtualization, networking, orchestration, etc.) where edge computing systems could be realized. And finally, the third part (applications) focuses on various application domains (e.g., smart cities) where edge computing systems could, or already did, help in providing novel services beyond the reach of pure/typical cloud computing solutions.