Knowledge

Edge computing

Source 📝

101: 25: 269:
making edge computing a significantly more feasible option than cloud computing. Examples range from IoT to autonomous driving, anything health or human / public safety relevant, or involving human perception such as facial recognition, which typically takes a human between 370-620 ms to perform. Edge computing is more likely to be able to mimic the same perception
90:—these were used to deliver website and video content from servers located near users. In the early 2000s, these systems expanded their scope to hosting other applications, leading to early edge computing services. These services could do things like find dealers, manage shopping carts, gather real-time data, and place ads. 222:
and thus requires special encryption mechanisms independent of the cloud. Edge nodes may also be resource-constrained devices, limiting the choice in terms of security methods. Moreover, a shift from centralized top-down infrastructure to a decentralized trust model is required. On the other hand, by
182:
technology, data centers cannot guarantee acceptable transfer rates and response times, which often is a critical requirement for many applications. Furthermore, devices at the edge constantly consume data coming from the cloud, forcing companies to decentralize data storage and service provisioning,
307:
or micro data centers near mobile users, which offer services typically found in the cloud, provided improvements in execution time when some of the tasks are offloaded to the edge node. On the other hand, offloading every task may result in a slowdown due to transfer times between device and nodes,
268:
Edge computing brings analytical computational resources close to the end users and therefore can increase the responsiveness and throughput of applications. A well-designed edge platform would significantly outperform a traditional cloud-based system. Some applications rely on short response times,
255:
of the entire distributed system, so that detection of errors and recovery become easily applicable. Other factors that may influence this aspect are the connection technologies in use, which may provide different levels of reliability, and the accuracy of the data produced at the edge that could be
285:
Additionally, the usage of edge computing as an intermediate stage between client devices and the wider internet results in efficiency savings that can be demonstrated in the following example: A client device requires computationally intensive processing on video files to be performed on external
250:
is crucial in order to keep a service alive. If a single node goes down and is unreachable, users should still be able to access a service without interruptions. Moreover, edge computing systems must provide actions to recover from a failure and alert the user about the incident. To this aim, each
234:
in a distributed network must face different issues. First, it must take into account the heterogeneity of the devices, having different performance and energy constraints, the highly dynamic condition, and the reliability of the connections compared to more robust infrastructure of cloud data
286:
servers. By using servers located on a local edge network to perform those computations, the video files only need to be transmitted in the local network. Avoiding transmission over the internet results in significant bandwidth savings and therefore increases efficiency. Another example is
281:
Due to the nearness of the analytical resources to the end users, sophisticated analytical tools and Artificial Intelligence tools can run on the edge of the system. This placement at the edge helps to increase operational efficiency and is responsible for many advantages to the system.
169:
by 2025. According to research firm Gartner, around 10 percent of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2025, the firm predicts that this figure will reach 75 percent. The increase in
223:
keeping and processing data at the edge, it is possible to increase privacy by minimizing the transmission of sensitive information to the cloud. Furthermore, the ownership of collected data shifts from service providers to end-users.
206:, service delivery, persistent data storage, and IoT management resulting in better response times and transfer rates. At the same time, distributing the logic to different network nodes introduces new issues and challenges. 302:
for real-time applications, such as facial recognition algorithms, showed considerable improvements in response times, as demonstrated in early research. Further research showed that using resource-rich machines called
74:
is a distributed computing model that brings computation and data storage closer to the sources of data. More broadly, it refers to any design that pushes computation physically closer to a user, so as to reduce the
443: 2012: 298:
Edge application services reduce the volumes of data that must be moved, the consequent traffic, and the distance that data must travel. That provides lower latency and reduces transmission costs.
290:. If the recognition is performed locally, it is possible to send the recognized text to the cloud rather than audio recordings, significantly reducing the amount of required bandwidth. 238:
The state-of-the-art scheduling technique can increase the effective utilization of edge resources and scales the edge server by assigning minimum edge resources to each offloaded task.
1082:
Garcia Lopez, Pedro; Montresor, Alberto; Epema, Dick; Datta, Anwitaman; Higashino, Teruo; Iamnitchi, Adriana; Barcellos, Marinho; Felber, Pascal; Riviere, Etienne (30 September 2015).
653: 629: 97:(IoT), where devices are connected to the internet, is often linked with edge computing. However, it's important to understand that edge computing and IoT are not the same thing. 2431: 468:"Globally Distributed Content Delivery, by J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman and B. Weihl, IEEE Internet Computing, Volume 6, Issue 5, November 2002" 273:
as humans, which is useful in applications such as augmented reality where the headset should preferably recognize who a person is at the same time as the wearer does.
1589: 432: 666: 608: 866: 530: 474: 235:
centers. Moreover, security requirements may introduce further latency in the communication between nodes, which may slow down the scaling process.
150:, edge nodes, known as "gamelets," are typically within one or two network hops from the client, ensuring quick response times for real-time games. 117:. Karim Arabi, during an IEEE DAC 2014 keynote and later at an MIT MTL Seminar in 2015, described edge computing as computing that occurs outside 2093: 940: 633: 186:
In a similar way, the aim of edge computing is to move the computation away from data centers towards the edge of the network, exploiting
2462: 654:
MIT MTL Seminar: Trends, Opportunities and Challenges Driving Architecture and Design of Next Generation Mobile Computing and IoT Devices
139:"The State of the Edge" report explains that edge computing focuses on servers located close to the end-users. Alex Reznik, Chair of the 891: 136:, fog computing serves as a distinct layer between edge computing and cloud computing, with each layer having its own responsibilities. 2457: 1644: 39: 1276: 1220: 1129: 942:
The Methods and Procedures for Accelerating Operations and Queries in Large Database Systems and Data Warehouse (Big Data Systems)
1667: 2050: 1566: 1364: 842: 730: 311:
IoT-based power grid system enables communication of electricity and data to monitor and control the power grid, which makes
35: 2467: 558:
Davis, A.; Parikh, J.; Weihl, W. (2004). "Edgecomputing: Extending enterprise applications to the edge of the internet".
2086: 968:
Shi, Weisong; Cao, Jie; Zhang, Quan; Li, Youhuizi; Xu, Lanyu (October 2016). "Edge Computing: Vision and Challenges".
560:
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters - WWW Alt. '04
1419: 754: 174:
devices at the edge of the network is producing a massive amount of data — storing and using all that data in cloud
2141: 1967: 1795: 825:
Anand, B.; Edwin, A. J. Hao (January 2014). "Gamelets — Multiplayer mobile games with distributed micro-clouds".
125:, edge computing environments are not always climate-controlled, despite requiring significant processing power. 2212: 1637: 575: 199: 1549:
Chakraborty, T.; Datta, S. K. (November 2017). "Home automation using edge computing and Internet of Things".
2487: 2273: 2079: 1712: 600: 2477: 2472: 2055: 499: 467: 195: 2482: 1450:
Minh, Quy Nguyen; Nguyen, Van-Hau; Quy, Vu Khanh; Ngoc, Le Anh; Chehri, Abdellah; Jeon, Gwanggil (2022).
1490: 256:
unreliable due to particular environment conditions. As an example, an edge computing device, such as a
2002: 1972: 179: 2390: 143:
MEC ISG standards committee, defines 'edge' loosely as anything that's not a traditional data center.
1957: 1949: 1702: 1630: 684: 1982: 1962: 360: 87: 1602: 2166: 1810: 711:"Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing" 400: 385: 347: 121:, at the network's edge, particularly for applications needing immediate data processing. Unlike 51: 260:, may continue to provide service to local users even during cloud service or internet outages. 1800: 813:
What is 'Edge'? The best that I can do is this: it's anything that's not a 'data center cloud'.
299: 218:. In edge computing, data may travel between different distributed nodes connected through the 1347:
Yi, S.; Hao, Z.; Qin, Z.; Li, Q. (November 2015). "Fog Computing: Platform and Applications".
2324: 1732: 1672: 1144:"ScalEdge: A framework for scalable edge computing in Internet of things–based smart systems" 390: 370: 114: 76: 779: 2156: 2102: 2060: 1994: 1773: 1682: 1016: 410: 1503:
Taleb, Tarik; Dutta, Sunny; Ksentini, Adlen; Iqbal, Muddesar; Flinck, Hannu (March 2017).
827:
2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU)
630:"IEEE DAC 2014 Keynote: Mobile Computing Opportunities, Challenges and Technology Drivers" 8: 2136: 1858: 1790: 1697: 798: 1020: 47: 2207: 2131: 1717: 1572: 1524: 1425: 1370: 1329: 1268: 1250: 1212: 1173: 1062: 1039: 1004: 985: 848: 783: 736: 581: 522: 287: 214:
The distributed nature of this paradigm introduces a shift in security schemes used in
171: 94: 2365: 2121: 2007: 1929: 1815: 1707: 1692: 1562: 1473: 1415: 1360: 1321: 1272: 1216: 1177: 1165: 1044: 838: 726: 571: 526: 395: 350:
in an edge computing environment, on the device or close to where data is collected.
312: 203: 1576: 1528: 1333: 852: 740: 157:
technology to simplify deploying and managing various applications on edge servers.
2395: 1896: 1805: 1744: 1722: 1554: 1516: 1463: 1429: 1405: 1397: 1374: 1352: 1313: 1260: 1204: 1155: 1105: 1095: 1034: 1024: 989: 977: 830: 718: 563: 514: 252: 585: 2421: 2375: 2314: 1780: 1768: 1727: 1653: 335: 257: 215: 118: 1520: 178:
pushes network bandwidth requirements to the limit. Despite the improvements in
100: 2400: 2344: 2299: 2248: 2126: 2022: 1904: 1876: 1825: 1687: 1349:
2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)
1301: 1242: 1208: 1192: 722: 710: 323: 166: 154: 113:
Edge computing involves running computer programs that deliver quick responses
1558: 1264: 1160: 1143: 981: 867:"Edge virtualization manages the data deluge, but can be complex | TechTarget" 834: 2451: 2436: 2309: 2197: 2161: 2027: 1939: 1477: 1389: 1325: 1169: 365: 319: 187: 129: 1401: 1394:
Proceedings of the third ACM workshop on Mobile cloud computing and services
1100: 1083: 567: 518: 2370: 2360: 2263: 1924: 1737: 1410: 1356: 1048: 500:"The Akamai network: A platform for high-performance internet applications" 405: 331: 175: 147: 133: 122: 132:, particularly in smaller setups. However, in larger deployments, such as 2405: 2385: 2116: 2037: 1977: 1785: 1590:
Size of the Prize: How Will Edge Computing in Space Drive Value Creation?
375: 231: 80: 1110: 198:
to perform tasks and provide services on behalf of the cloud. By moving
2426: 2380: 2334: 2202: 2071: 2017: 1843: 1677: 1468: 1451: 670: 380: 327: 308:
so depending on the workload, an optimal configuration can be defined.
191: 1504: 1388:
Verbelen, Tim; Simoens, Pieter; De Turck, Filip; Dhoedt, Bart (2012).
1317: 1029: 2217: 1914: 1193:"Edge Computing for Autonomous Driving: Opportunities and Challenges" 339: 2339: 2329: 2258: 2253: 2151: 1871: 1763: 1754: 1622: 1255: 915: 304: 247: 219: 1003:
Merenda, Massimo; Porcaro, Carlo; Iero, Demetrio (29 April 2020).
2283: 2243: 2238: 2182: 2032: 1919: 1909: 1848: 1835: 1452:"Edge Computing for IoT-Enabled Smart Grid: The Future of Energy" 1190: 497: 1551:
2017 IEEE International Symposium on Consumer Electronics (ISCE)
667:"Super Micro Computer introduces new systems for edge computing" 2319: 2278: 2268: 1934: 1866: 1081: 2304: 2192: 2187: 2146: 1387: 270: 1005:"Edge Machine Learning for AI-Enabled IoT Devices: A Review" 2222: 1886: 1881: 1820: 1243:"A Survey on the Edge Computing for the Internet of Things" 140: 1505:"Mobile Edge Computing Potential in Making Cities Smarter" 1191:
Liu, S.; Liu, L.; Tang, B. Wu; Wang, J.; Shi, W. (2019).
1502: 165:
The world's data is expected to grow 61 percent to 175
892:"IDC: Expect 175 zettabytes of data worldwide by 2025" 546:
See Section 6.2: Distributing Applications to the Edge
79:
compared to when an application runs on a centralized
755:"Difference Between Edge Computing and Fog Computing" 1592:
Published by Via Satellite retrieved August 18, 2023
1148:
International Journal of Distributed Sensor Networks
1142:
Babar, Mohammad; Sohail Khan, Muhammad (July 2021).
952:(Doctoral thesis) (in Serbian and American English). 86:The term began being used in the 1990s to describe 1381: 1002: 709:Dolui, Koustabh; Datta, Soumya Kanti (June 2017). 1449: 2449: 1548: 1542: 1141: 664: 557: 1493:Published by wired.com retrieved April 10, 2019 202:to the edge, it is possible to provide content 183:leveraging physical proximity to the end user. 1299: 950:National Repository of Dissertations in Serbia 498:Nygren., E.; Sitaraman R. K.; Sun, J. (2010). 2087: 1638: 967: 715:2017 Global Internet of Things Summit (GIoTS) 1496: 963: 961: 959: 818: 601:"2021 Strategic Roadmap for Edge Computing" 2094: 2080: 1645: 1631: 1346: 1075: 824: 708: 1491:It's Time to Think Beyond Cloud Computing 1467: 1409: 1254: 1159: 1109: 1099: 1088:ACM SIGCOMM Computer Communication Review 1038: 1028: 2101: 1300:Satyanarayanan, Mahadev (January 2017). 1125: 1123: 1121: 956: 889: 99: 50:by adding descriptive text and removing 938: 536:from the original on September 13, 2012 209: 2450: 1340: 1132:. Aron Brand. Medium.com. Sep 20, 2019 796: 2075: 1626: 1295: 1293: 1118: 128:Edge computing is often equated with 1652: 433:"Gartner Trend Insights report 2018" 18: 598: 507:ACM SIGOPS Operating Systems Review 430: 318:Other notable applications include 13: 2463:Distributed computing architecture 1290: 1247:IEEE Access, vol. 6, pp. 6900-6919 1240: 460: 14: 2499: 2458:Post-cloud computing architecture 1302:"The Emergence of Edge Computing" 685:"What is fog and edge computing?" 491: 104:The edge computing infrastructure 916:"What We Do and How We Got Here" 115:close to where requests are made 23: 1968:Light-weight Linux distribution 1796:Hacking of consumer electronics 1595: 1583: 1484: 1443: 1279:from the original on 2021-05-26 1234: 1223:from the original on 2021-05-26 1184: 1135: 1055: 996: 970:IEEE Internet of Things Journal 932: 908: 883: 859: 790: 772: 747: 702: 611:from the original on 2021-03-30 480:from the original on 2017-08-09 449:from the original on 2020-12-18 293: 2213:Radio-frequency identification 1130:3 Advantages of Edge Computing 677: 658: 647: 622: 592: 551: 424: 342:systems. The nascent field of 241: 226: 16:Distributed computing paradigm 1: 939:Ivkovic, Jovan (2016-07-11). 890:Patrizio, Andy (2018-12-03). 417: 276: 108: 2056:List of open-source hardware 1509:IEEE Communications Magazine 1241:Yu, W.; et al. (2018). 344:edge artificial intelligence 7: 1521:10.1109/MCOM.2017.1600249CM 803:ETSI - ETSI Blog - etsi.org 797:Reznik, Alex (2018-05-14). 353: 10: 2504: 2468:Load balancing (computing) 1973:Real-time operating system 1209:10.1109/JPROC.2019.2915983 723:10.1109/GIOTS.2017.8016213 160: 2414: 2353: 2292: 2231: 2175: 2109: 2046: 1993: 1958:Linux on embedded systems 1948: 1895: 1857: 1834: 1753: 1660: 1559:10.1109/ISCE.2017.8355544 1265:10.1109/JIOT.2021.3072611 1161:10.1177/15501477211035332 982:10.1109/JIOT.2016.2579198 835:10.1109/ICMU.2014.6799051 780:"Data at the Edge Report" 346:(edge AI) implements the 251:device must maintain the 153:Edge computing might use 88:content delivery networks 2167:Wireless sensor networks 1963:Linux for mobile devices 1084:"Edge-centric Computing" 361:Content delivery network 263: 2391:Josef Preishuber-Pflügl 1811:PlayStation 3 Jailbreak 1402:10.1145/2307849.2307858 1396:. ACM. pp. 29–36. 1197:Proceedings of the IEEE 1101:10.1145/2831347.2831354 568:10.1145/1013367.1013397 519:10.1145/1842733.1842736 401:Serverless architecture 386:Heterogeneous computing 348:artificial intelligence 52:less pertinent examples 1801:Homebrew (video games) 1357:10.1109/HotWeb.2015.22 1154:(7): 155014772110353. 665:Kenn Anthony Mendoza. 300:Computation offloading 105: 2325:Internet refrigerator 1995:Programming languages 1733:Single-board computer 1673:Board support package 391:Mobile edge computing 371:Edge data integration 103: 2488:Ambient intelligence 2157:Ubiquitous computing 2103:Ambient intelligence 2061:Open-source robotics 2051:Lightweight browsers 1774:Proprietary firmware 1683:Consumer electronics 411:Ubiquitous computing 210:Privacy and security 2478:Networking hardware 2473:Network performance 2137:Object hyperlinking 1791:Defective by Design 1698:Embedded hypervisor 1021:2020Senso..20.2533M 689:Capgemini Worldwide 48:improve the article 2483:Internet of things 2208:Machine to machine 2132:Internet of things 1859:Software libraries 1603:"What is edge AI?" 1553:. pp. 47–49. 1469:10.3390/en15176140 1351:. pp. 73–78. 829:. pp. 14–20. 784:Seagate Technology 106: 95:Internet of Things 2445: 2444: 2366:Gaetano Borriello 2122:Context awareness 2069: 2068: 2008:Assembly language 1950:Operating systems 1930:Stand-alone shell 1897:Programming tools 1816:Rooting (Android) 1708:Embedded software 1693:Embedded database 1568:978-1-5386-2189-9 1366:978-1-4673-9688-2 1318:10.1109/MC.2017.9 1030:10.3390/s20092533 844:978-1-4799-2231-4 732:978-1-5090-5873-0 396:Personal computer 313:energy management 288:voice recognition 69: 68: 2495: 2396:John Seely Brown 2096: 2089: 2082: 2073: 2072: 1806:iOS jailbreaking 1723:Memory footprint 1654:Embedded systems 1647: 1640: 1633: 1624: 1623: 1617: 1616: 1614: 1613: 1599: 1593: 1587: 1581: 1580: 1546: 1540: 1539: 1537: 1535: 1500: 1494: 1488: 1482: 1481: 1471: 1447: 1441: 1440: 1438: 1436: 1413: 1385: 1379: 1378: 1344: 1338: 1337: 1297: 1288: 1287: 1285: 1284: 1258: 1238: 1232: 1231: 1229: 1228: 1203:(8): 1697–1716. 1188: 1182: 1181: 1163: 1139: 1133: 1127: 1116: 1115: 1113: 1103: 1079: 1073: 1072: 1070: 1069: 1063:"IoT management" 1059: 1053: 1052: 1042: 1032: 1000: 994: 993: 965: 954: 953: 947: 936: 930: 929: 927: 926: 912: 906: 905: 903: 902: 887: 881: 880: 878: 877: 863: 857: 856: 822: 816: 815: 810: 809: 794: 788: 787: 776: 770: 769: 767: 766: 751: 745: 744: 717:. pp. 1–6. 706: 700: 699: 697: 696: 681: 675: 674: 662: 656: 651: 645: 644: 642: 641: 632:. Archived from 626: 620: 619: 617: 616: 596: 590: 589: 555: 549: 548: 543: 541: 535: 504: 495: 489: 488: 486: 485: 479: 472: 464: 458: 457: 455: 454: 448: 437: 428: 315:more efficient. 253:network topology 196:network gateways 64: 61: 55: 27: 26: 19: 2503: 2502: 2498: 2497: 2496: 2494: 2493: 2492: 2448: 2447: 2446: 2441: 2422:Ambient Devices 2410: 2376:Stefano Marzano 2349: 2315:Home automation 2288: 2227: 2171: 2105: 2100: 2070: 2065: 2042: 1989: 1944: 1891: 1853: 1830: 1781:Closed platform 1769:Custom firmware 1749: 1728:Microcontroller 1656: 1651: 1621: 1620: 1611: 1609: 1601: 1600: 1596: 1588: 1584: 1569: 1547: 1543: 1533: 1531: 1501: 1497: 1489: 1485: 1448: 1444: 1434: 1432: 1422: 1411:1854/LU-2984272 1386: 1382: 1367: 1345: 1341: 1298: 1291: 1282: 1280: 1239: 1235: 1226: 1224: 1189: 1185: 1140: 1136: 1128: 1119: 1080: 1076: 1067: 1065: 1061: 1060: 1056: 1001: 997: 966: 957: 945: 937: 933: 924: 922: 914: 913: 909: 900: 898: 888: 884: 875: 873: 865: 864: 860: 845: 823: 819: 807: 805: 799:"What is Edge?" 795: 791: 778: 777: 773: 764: 762: 753: 752: 748: 733: 707: 703: 694: 692: 683: 682: 678: 663: 659: 652: 648: 639: 637: 628: 627: 623: 614: 612: 605:www.gartner.com 597: 593: 578: 562:. p. 180. 556: 552: 539: 537: 533: 502: 496: 492: 483: 481: 477: 470: 466: 465: 461: 452: 450: 446: 435: 429: 425: 420: 415: 356: 336:home automation 324:autonomous cars 296: 279: 266: 258:voice assistant 244: 229: 216:cloud computing 212: 163: 111: 65: 59: 56: 45: 28: 24: 17: 12: 11: 5: 2501: 2491: 2490: 2485: 2480: 2475: 2470: 2465: 2460: 2443: 2442: 2440: 2439: 2434: 2432:Ebbits project 2429: 2424: 2418: 2416: 2412: 2411: 2409: 2408: 2403: 2401:Bruce Sterling 2398: 2393: 2388: 2383: 2378: 2373: 2368: 2363: 2357: 2355: 2351: 2350: 2348: 2347: 2345:Smarter Planet 2342: 2337: 2332: 2327: 2322: 2317: 2312: 2307: 2302: 2300:Ambient device 2296: 2294: 2290: 2289: 2287: 2286: 2281: 2276: 2271: 2266: 2261: 2256: 2251: 2246: 2241: 2235: 2233: 2229: 2228: 2226: 2225: 2220: 2215: 2210: 2205: 2200: 2195: 2190: 2185: 2179: 2177: 2173: 2172: 2170: 2169: 2164: 2159: 2154: 2149: 2144: 2139: 2134: 2129: 2127:Device ecology 2124: 2119: 2113: 2111: 2107: 2106: 2099: 2098: 2091: 2084: 2076: 2067: 2066: 2064: 2063: 2058: 2053: 2047: 2044: 2043: 2041: 2040: 2035: 2030: 2025: 2020: 2015: 2010: 2005: 1999: 1997: 1991: 1990: 1988: 1987: 1986: 1985: 1975: 1970: 1965: 1960: 1954: 1952: 1946: 1945: 1943: 1942: 1937: 1932: 1927: 1922: 1917: 1912: 1907: 1905:Almquist shell 1901: 1899: 1893: 1892: 1890: 1889: 1884: 1879: 1877:Embedded GLIBC 1874: 1869: 1863: 1861: 1855: 1854: 1852: 1851: 1846: 1840: 1838: 1832: 1831: 1829: 1828: 1826:Vendor lock-in 1823: 1818: 1813: 1808: 1803: 1798: 1793: 1788: 1783: 1778: 1777: 1776: 1771: 1760: 1758: 1751: 1750: 1748: 1747: 1742: 1741: 1740: 1730: 1725: 1720: 1715: 1710: 1705: 1700: 1695: 1690: 1688:Cross compiler 1685: 1680: 1675: 1670: 1664: 1662: 1658: 1657: 1650: 1649: 1642: 1635: 1627: 1619: 1618: 1607:www.redhat.com 1594: 1582: 1567: 1541: 1495: 1483: 1442: 1420: 1380: 1365: 1339: 1289: 1233: 1183: 1134: 1117: 1074: 1054: 995: 976:(5): 637–646. 955: 931: 907: 882: 858: 843: 817: 789: 771: 746: 731: 701: 676: 657: 646: 621: 591: 576: 550: 490: 459: 422: 421: 419: 416: 414: 413: 408: 403: 398: 393: 388: 383: 378: 373: 368: 363: 357: 355: 352: 320:connected cars 295: 292: 278: 275: 265: 262: 246:Management of 243: 240: 228: 225: 211: 208: 162: 159: 155:virtualization 110: 107: 72:Edge computing 67: 66: 31: 29: 22: 15: 9: 6: 4: 3: 2: 2500: 2489: 2486: 2484: 2481: 2479: 2476: 2474: 2471: 2469: 2466: 2464: 2461: 2459: 2456: 2455: 2453: 2438: 2437:IPSO Alliance 2435: 2433: 2430: 2428: 2425: 2423: 2420: 2419: 2417: 2413: 2407: 2404: 2402: 2399: 2397: 2394: 2392: 2389: 2387: 2384: 2382: 2379: 2377: 2374: 2372: 2369: 2367: 2364: 2362: 2359: 2358: 2356: 2352: 2346: 2343: 2341: 2338: 2336: 2333: 2331: 2328: 2326: 2323: 2321: 2318: 2316: 2313: 2311: 2310:Connected car 2308: 2306: 2303: 2301: 2298: 2297: 2295: 2291: 2285: 2282: 2280: 2277: 2275: 2272: 2270: 2267: 2265: 2262: 2260: 2257: 2255: 2252: 2250: 2247: 2245: 2242: 2240: 2237: 2236: 2234: 2230: 2224: 2221: 2219: 2216: 2214: 2211: 2209: 2206: 2204: 2201: 2199: 2198:IEEE 802.15.4 2196: 2194: 2191: 2189: 2186: 2184: 2181: 2180: 2178: 2174: 2168: 2165: 2163: 2162:Web of Things 2160: 2158: 2155: 2153: 2150: 2148: 2145: 2143: 2140: 2138: 2135: 2133: 2130: 2128: 2125: 2123: 2120: 2118: 2115: 2114: 2112: 2108: 2104: 2097: 2092: 2090: 2085: 2083: 2078: 2077: 2074: 2062: 2059: 2057: 2054: 2052: 2049: 2048: 2045: 2039: 2036: 2034: 2031: 2029: 2028:Embedded Java 2026: 2024: 2021: 2019: 2016: 2014: 2011: 2009: 2006: 2004: 2001: 2000: 1998: 1996: 1992: 1984: 1981: 1980: 1979: 1976: 1974: 1971: 1969: 1966: 1964: 1961: 1959: 1956: 1955: 1953: 1951: 1947: 1941: 1940:Yocto Project 1938: 1936: 1933: 1931: 1928: 1926: 1923: 1921: 1918: 1916: 1913: 1911: 1908: 1906: 1903: 1902: 1900: 1898: 1894: 1888: 1885: 1883: 1880: 1878: 1875: 1873: 1870: 1868: 1865: 1864: 1862: 1860: 1856: 1850: 1847: 1845: 1842: 1841: 1839: 1837: 1833: 1827: 1824: 1822: 1819: 1817: 1814: 1812: 1809: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1775: 1772: 1770: 1767: 1766: 1765: 1762: 1761: 1759: 1756: 1752: 1746: 1743: 1739: 1736: 1735: 1734: 1731: 1729: 1726: 1724: 1721: 1719: 1716: 1714: 1711: 1709: 1706: 1704: 1701: 1699: 1696: 1694: 1691: 1689: 1686: 1684: 1681: 1679: 1676: 1674: 1671: 1669: 1666: 1665: 1663: 1661:General terms 1659: 1655: 1648: 1643: 1641: 1636: 1634: 1629: 1628: 1625: 1608: 1604: 1598: 1591: 1586: 1578: 1574: 1570: 1564: 1560: 1556: 1552: 1545: 1530: 1526: 1522: 1518: 1514: 1510: 1506: 1499: 1492: 1487: 1479: 1475: 1470: 1465: 1461: 1457: 1453: 1446: 1431: 1427: 1423: 1421:9781450313193 1417: 1412: 1407: 1403: 1399: 1395: 1391: 1384: 1376: 1372: 1368: 1362: 1358: 1354: 1350: 1343: 1335: 1331: 1327: 1323: 1319: 1315: 1311: 1307: 1303: 1296: 1294: 1278: 1274: 1270: 1266: 1262: 1257: 1252: 1248: 1244: 1237: 1222: 1218: 1214: 1210: 1206: 1202: 1198: 1194: 1187: 1179: 1175: 1171: 1167: 1162: 1157: 1153: 1149: 1145: 1138: 1131: 1126: 1124: 1122: 1112: 1107: 1102: 1097: 1093: 1089: 1085: 1078: 1064: 1058: 1050: 1046: 1041: 1036: 1031: 1026: 1022: 1018: 1014: 1010: 1006: 999: 991: 987: 983: 979: 975: 971: 964: 962: 960: 951: 944: 943: 935: 921: 917: 911: 897: 896:Network World 893: 886: 872: 871:IT Operations 868: 862: 854: 850: 846: 840: 836: 832: 828: 821: 814: 804: 800: 793: 785: 781: 775: 760: 759:GeeksforGeeks 756: 750: 742: 738: 734: 728: 724: 720: 716: 712: 705: 690: 686: 680: 672: 668: 661: 655: 650: 636:on 2020-07-30 635: 631: 625: 610: 606: 602: 595: 587: 583: 579: 573: 569: 565: 561: 554: 547: 532: 528: 524: 520: 516: 512: 508: 501: 494: 476: 469: 463: 445: 441: 434: 427: 423: 412: 409: 407: 404: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 366:Dew computing 364: 362: 359: 358: 351: 349: 345: 341: 337: 333: 329: 325: 321: 316: 314: 309: 306: 301: 291: 289: 283: 274: 272: 261: 259: 254: 249: 239: 236: 233: 224: 221: 217: 207: 205: 201: 197: 193: 192:mobile phones 189: 188:smart objects 184: 181: 177: 173: 168: 158: 156: 151: 149: 144: 142: 137: 135: 131: 130:fog computing 126: 124: 120: 116: 102: 98: 96: 91: 89: 84: 82: 78: 73: 63: 53: 49: 43: 41: 37: 32:This article 30: 21: 20: 2371:Adam Dunkels 2361:Kevin Ashton 2293:Applications 2264:Raspberry Pi 2176:Technologies 2023:Embedded C++ 1925:OpenEmbedded 1836:Boot loaders 1757:and controls 1738:Raspberry Pi 1610:. Retrieved 1606: 1597: 1585: 1550: 1544: 1532:. Retrieved 1515:(3): 38–43. 1512: 1508: 1498: 1486: 1462:(17): 6140. 1459: 1455: 1445: 1433:. Retrieved 1393: 1383: 1348: 1342: 1312:(1): 30–39. 1309: 1305: 1281:. Retrieved 1246: 1236: 1225:. Retrieved 1200: 1196: 1186: 1151: 1147: 1137: 1111:11572/114780 1094:(5): 37–42. 1091: 1087: 1077: 1066:. Retrieved 1057: 1012: 1008: 998: 973: 969: 949: 941: 934: 923:. Retrieved 919: 910: 899:. Retrieved 895: 885: 874:. Retrieved 870: 861: 826: 820: 812: 806:. Retrieved 802: 792: 774: 763:. Retrieved 761:. 2021-11-27 758: 749: 714: 704: 693:. Retrieved 691:. 2017-03-02 688: 679: 660: 649: 638:. Retrieved 634:the original 624: 613:. Retrieved 604: 594: 559: 553: 545: 540:November 19, 538:. Retrieved 510: 506: 493: 482:. Retrieved 462: 451:. Retrieved 439: 426: 406:Smart camera 343: 332:Industry 4.0 328:smart cities 317: 310: 297: 294:Applications 284: 280: 267: 245: 237: 230: 213: 185: 176:data centers 164: 152: 148:cloud gaming 145: 138: 134:smart cities 127: 123:data centers 112: 92: 85: 71: 70: 57: 46:Please help 34:may contain 33: 2406:Mark Weiser 2386:Roel Pieper 2117:Ambient IoT 2038:MicroPython 1978:Windows IoT 1786:Crippleware 1703:Embedded OS 1390:"Cloudlets" 1015:(9): 2533. 513:(3): 2–19. 376:Edge device 242:Reliability 232:Scalability 227:Scalability 81:data centre 2452:Categories 2427:AmbieSense 2381:Don Norman 2335:Smart city 2203:Internet 0 2018:Embedded C 1678:Bootloader 1612:2023-10-25 1283:2021-05-26 1256:2104.01776 1227:2021-05-26 1068:2020-04-08 925:2021-12-21 901:2021-07-09 876:2022-12-13 808:2019-02-19 765:2022-09-11 695:2021-07-06 671:Supermicro 640:2019-03-25 615:2021-07-11 577:1581139128 484:2019-10-25 453:2021-05-26 418:References 381:Fat client 277:Efficiency 167:zettabytes 109:Definition 40:irrelevant 2249:Gadgeteer 2232:Platforms 2218:Smartdust 2142:Profiling 1915:Buildroot 1478:1996-1073 1326:1558-0814 1273:233025108 1217:198311944 1178:236917011 1170:1550-1477 599:Gartner. 527:207181702 431:Gartner. 340:satellite 305:cloudlets 248:failovers 119:the cloud 60:July 2023 36:excessive 2354:Pioneers 2340:Smart TV 2330:Nabaztag 2259:Netduino 2254:ioBridge 2152:Supranet 2110:Concepts 1872:dietlibc 1764:Firmware 1755:Firmware 1577:19156163 1529:11163718 1456:Energies 1334:12563598 1306:Computer 1277:Archived 1221:Archived 1049:32365645 853:10374389 741:11600169 609:Archived 531:Archived 475:Archived 444:Archived 354:See also 220:Internet 200:services 42:examples 2284:NodeMCU 2244:Contiki 2239:Arduino 2183:6LoWPAN 2033:MISRA C 1920:BusyBox 1910:BitBake 1849:Barebox 1430:3249347 1375:6753944 1040:7273223 1017:Bibcode 1009:Sensors 990:4237186 920:Gartner 440:Gartner 204:caching 180:network 161:Concept 77:latency 2320:HomeOS 2279:Xively 2274:Wiring 2269:TinyOS 1983:Win CE 1935:Toybox 1867:uClibc 1844:U-Boot 1575:  1565:  1534:5 July 1527:  1476:  1435:4 July 1428:  1418:  1373:  1363:  1332:  1324:  1271:  1215:  1176:  1168:  1047:  1037:  988:  851:  841:  739:  729:  586:578337 584:  574:  525:  2415:Other 2305:CeNSE 2193:DASH7 2147:Spime 1573:S2CID 1525:S2CID 1426:S2CID 1371:S2CID 1330:S2CID 1269:S2CID 1251:arXiv 1213:S2CID 1174:S2CID 986:S2CID 946:(PDF) 849:S2CID 737:S2CID 582:S2CID 534:(PDF) 523:S2CID 503:(PDF) 478:(PDF) 471:(PDF) 447:(PDF) 436:(PDF) 271:speed 264:Speed 194:, or 2223:XBee 2188:ANT+ 2013:CAPL 1887:musl 1882:lwIP 1821:UEFI 1713:FPGA 1668:ASIC 1563:ISBN 1536:2019 1474:ISSN 1437:2019 1416:ISBN 1361:ISBN 1322:ISSN 1166:ISSN 1045:PMID 839:ISBN 727:ISBN 572:ISBN 542:2012 338:and 141:ETSI 93:The 2003:Ada 1745:SoC 1718:IoT 1555:doi 1517:doi 1464:doi 1406:hdl 1398:doi 1353:doi 1314:doi 1261:doi 1205:doi 1201:107 1156:doi 1106:hdl 1096:doi 1035:PMC 1025:doi 978:doi 831:doi 719:doi 564:doi 515:doi 172:IoT 146:In 38:or 2454:: 1605:. 1571:. 1561:. 1523:. 1513:55 1511:. 1507:. 1472:. 1460:15 1458:. 1454:. 1424:. 1414:. 1404:. 1392:. 1369:. 1359:. 1328:. 1320:. 1310:50 1308:. 1304:. 1292:^ 1275:. 1267:. 1259:. 1249:. 1245:. 1219:. 1211:. 1199:. 1195:. 1172:. 1164:. 1152:17 1150:. 1146:. 1120:^ 1104:. 1092:45 1090:. 1086:. 1043:. 1033:. 1023:. 1013:20 1011:. 1007:. 984:. 972:. 958:^ 948:. 918:. 894:. 869:. 847:. 837:. 811:. 801:. 782:. 757:. 735:. 725:. 713:. 687:. 669:. 607:. 603:. 580:. 570:. 544:. 529:. 521:. 511:44 509:. 505:. 473:. 442:. 438:. 334:, 330:, 326:, 322:, 190:, 83:. 2095:e 2088:t 2081:v 1646:e 1639:t 1632:v 1615:. 1579:. 1557:: 1538:. 1519:: 1480:. 1466:: 1439:. 1408:: 1400:: 1377:. 1355:: 1336:. 1316:: 1286:. 1263:: 1253:: 1230:. 1207:: 1180:. 1158:: 1114:. 1108:: 1098:: 1071:. 1051:. 1027:: 1019:: 992:. 980:: 974:3 928:. 904:. 879:. 855:. 833:: 786:. 768:. 743:. 721:: 698:. 673:. 643:. 618:. 588:. 566:: 517:: 487:. 456:. 62:) 58:( 54:. 44:.

Index

excessive
irrelevant
improve the article
less pertinent examples
latency
data centre
content delivery networks
Internet of Things

close to where requests are made
the cloud
data centers
fog computing
smart cities
ETSI
cloud gaming
virtualization
zettabytes
IoT
data centers
network
smart objects
mobile phones
network gateways
services
caching
cloud computing
Internet
Scalability
failovers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.