Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T.  ACM Computing Surveys 52 (6): 1-36, 2019. Type: Article
Date Reviewed: Jun 17 2022

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies that “edge” does not refer to a single spatial position but to a multitude of options for (physically) placing the different technologies required for a true end-to-end IoT solution.

Four of these technology options are briefly introduced, discussed, and superficially compared in the first part (eight pages) of the survey, with the bulk being devoted to selectively and shortly presenting current (13 pages) and potential future (four pages) research topics for the respective technologies.

Besides presenting the two well-known concepts of multi-access edge computing (still called “mobile edge computing,” which is now obsolete) and fog computing, I found the inclusion of transparent computing and cloudlets very interesting. The technologies are explained on a level accessible to anyone interested in information technology on a fairly general level, and largely good. As always, the authors fail to provide good criteria for differentiating between fog and edge.

Current research topics cited revolve around energy optimization, latency minimization, the ubiquitous security and privacy concerns, and, surprisingly, caching. Topics are typically described in a short paragraph and, apparently, not ordered or further structured in any way.

This style continues in Section 6, “Future Research Directions,” which contains possibilities such as block-streaming service loading, lightweight virtualization, and flexible network operating systems (and again security).

The survey is easily accessible and contains lots of concepts and stimulating facts. It is recommended for the non-IoT specialist with interests in one of the several topics indicated here. Experts, though, should be aware that the content reflects the state of the art as of January 2019.

Reviewer:  Christoph F. Strnadl Review #: CR147456 (2208-0116)
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Human Factors (H.1.2 ... )
 
 
Cloud Computing (C.2.4 ... )
 
 
Distributed Architectures (C.1.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Human Factors": Date
Website visual design qualities: a threefold framework
Hartono E., Holsapple C.  ACM Transactions on Management Information Systems 10(1): 1-21, 2019. Type: Article
May 19 2022
Widar2.0: passive human tracking with a single Wi-Fi link
Qian K., Wu C., Zhang Y., Zhang G., Yang Z., Liu Y.  MobiSys 2018 (Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany,  Jun 10-15, 2018) 350-361, 2018. Type: Proceedings
Jun 22 2021
Rehumanized crowdsourcing: a labeling framework addressing bias and ethics in machine learning
Barbosa N., Chen M.  CHI 2019 (Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK,  May 4-9, 2019) 1-12, 2019. Type: Proceedings
Jun 1 2021
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy