<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-irtf-t2trg-iot-edge-10" number="9556" submissionType="IRTF" category="info" consensus="true" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" updates="" obsoletes="" xml:lang="en" prepTime="2024-04-11T09:49:57" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-edge-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9556" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="IoT Edge Computing">Internet of Things (IoT) Edge Challenges and Functions</title>
    <seriesInfo name="RFC" value="9556" stream="IRTF"/>
    <author initials="J." surname="Hong" fullname="Jungha Hong">
      <organization showOnFrontPage="true">ETRI</organization>
      <address>
        <postal>
          <street>218 Gajeong-ro, Yuseung-Gu</street>
          <city>Daejeon</city>
          <code>34129</code>
          <country>Republic of Korea</country>
        </postal>
        <email>jhong@etri.re.kr</email>
      </address>
    </author>
    <author initials="Y-G." surname="Hong" fullname="Yong-Geun Hong">
      <organization showOnFrontPage="true">Daejeon University</organization>
      <address>
        <postal>
          <street>62 Daehak-ro, Dong-gu</street>
          <city>Daejeon</city>
          <code>300716</code>
          <country>Republic of Korea</country>
        </postal>
        <email>yonggeun.hong@gmail.com</email>
      </address>
    </author>
    <author initials="X." surname="de Foy" fullname="Xavier de Foy">
      <organization showOnFrontPage="true">InterDigital Communications, LLC</organization>
      <address>
        <postal>
          <street>1000 Sherbrooke West</street>
          <city>Montreal</city>
          <code>H3A 3G4</code>
          <country>Canada</country>
        </postal>
        <email>xavier.defoy@interdigital.com</email>
      </address>
    </author>
    <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
      <organization showOnFrontPage="true">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25 C // 3.OG</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>ietf@kovatsch.net</email>
      </address>
    </author>
    <author initials="E." surname="Schooler" fullname="Eve Schooler">
      <organization showOnFrontPage="true">University of Oxford</organization>
      <address>
        <postal>
          <street>Parks Road</street>
          <city>Oxford</city>
          <code>OX1 3PJ</code>
          <country>United Kingdom</country>
        </postal>
        <email>eve.schooler@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
      <organization abbrev="HKUST(GZ)" showOnFrontPage="true">Hong Kong University of Science and Technology (Guangzhou)</organization>
      <address>
        <postal>
          <street>No.1 Du Xue Rd</street>
          <city>Guangzhou</city>
          <country>China</country>
        </postal>
        <email>ietf@dkutscher.net</email>
      </address>
    </author>
    <date month="04" year="2024"/>
    <workgroup>Thing-to-Thing</workgroup>
    <keyword>in-network computing</keyword>
    <keyword>in-network caching</keyword>
    <keyword>in-network storage</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">Many Internet of Things (IoT) applications have requirements that cannot be satisfied by centralized cloud-based systems (i.e., cloud computing). These include time sensitivity, data volume, connectivity cost, operation in the face of intermittent services, privacy, and security. As a result, IoT is driving the Internet toward edge computing. This document outlines the requirements of the emerging IoT edge and its challenges. It presents a general model and major components of the IoT edge to provide a common basis for future discussions in the Thing-to-Thing Research Group (T2TRG) and other IRTF and IETF groups. This document is a product of the IRTF T2TRG.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Research Task Force
            (IRTF).  The IRTF publishes the results of Internet-related
            research and development activities.  These results might not be
            suitable for deployment.  This RFC represents the consensus of the Thing-to-Thing
            Research Group of the Internet Research Task Force (IRTF).
            Documents approved for publication by the IRSG are not
            candidates for any level of Internet Standard; see Section 2 of RFC
            7841.   
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9556" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2024 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-background">Background</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-internet-of-things-iot">Internet of Things (IoT)</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cloud-computing">Cloud Computing</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-edge-computing">Edge Computing</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.4">
                <t indent="0" pn="section-toc.1-1.2.2.4.1"><xref derivedContent="2.4" format="counter" sectionFormat="of" target="section-2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples-of-iot-edge-comput">Examples of IoT Edge Computing Use Cases</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iot-challenges-leading-towa">IoT Challenges Leading toward Edge Computing</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-time-sensitivity">Time Sensitivity</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-connectivity-cost">Connectivity Cost</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-resilience-to-intermittent-">Resilience to Intermittent Services</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-and-security">Privacy and Security</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iot-edge-computing-function">IoT Edge Computing Functions</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-overview-of-iot-edge-comput">Overview of IoT Edge Computing</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-general-model">General Model</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-oam-components">OAM Components</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-resource-discovery-and-auth">Resource Discovery and Authentication</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-edge-organization-and-feder">Edge Organization and Federation</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.3.1"><xref derivedContent="4.3.3" format="counter" sectionFormat="of" target="section-4.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-multi-tenancy-and-isolation">Multi-Tenancy and Isolation</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-functional-components">Functional Components</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.4.2">
                  <li pn="section-toc.1-1.4.2.4.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.4.2.1.1"><xref derivedContent="4.4.1" format="counter" sectionFormat="of" target="section-4.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-in-network-computation">In-Network Computation</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.4.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.4.2.2.1"><xref derivedContent="4.4.2" format="counter" sectionFormat="of" target="section-4.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-edge-storage-and-caching">Edge Storage and Caching</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.4.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.4.2.3.1"><xref derivedContent="4.4.3" format="counter" sectionFormat="of" target="section-4.4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-communication">Communication</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-application-components">Application Components</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.5.2">
                  <li pn="section-toc.1-1.4.2.5.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.5.2.1.1"><xref derivedContent="4.5.1" format="counter" sectionFormat="of" target="section-4.5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iot-device-management">IoT Device Management</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.5.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.5.2.2.1"><xref derivedContent="4.5.2" format="counter" sectionFormat="of" target="section-4.5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-management-and-analyti">Data Management and Analytics</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t indent="0" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-simulation-and-emulation-en">Simulation and Emulation Environments</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conclusion">Conclusion</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">At the time of writing, many IoT services leverage cloud computing platforms because they provide virtually unlimited storage and processing power. The reliance of IoT on back-end cloud computing provides additional advantages, such as scalability and efficiency.  At the time of writing, IoT systems are fairly static with respect to integrating and supporting computation.  It is not that there is no computation, but that systems are often limited to static configurations (edge gateways and cloud services).</t>
      <t indent="0" pn="section-1-2">However, IoT devices generate large amounts of data at the edges of the network. To meet IoT use case requirements, data is increasingly being stored, processed, analyzed, and acted upon close to the data sources. These requirements include time sensitivity, data volume, connectivity cost, and resiliency in the presence of intermittent connectivity, privacy, and security, which cannot be addressed by centralized cloud computing. A more flexible approach is necessary to address these needs effectively. This involves distributing computing (and storage) and seamlessly integrating it into the edge-cloud continuum. We refer to this integration of edge computing and IoT as "IoT edge computing". This document describes the related background, use cases, challenges, system models, and functional components.</t>
      <t indent="0" pn="section-1-3">Owing to the dynamic nature of the IoT edge computing landscape, this document does not list existing projects in this field. <xref target="sec-overview" format="default" sectionFormat="of" derivedContent="Section 4.1"/> presents a high-level overview of the field based on a limited review of standards, research, and open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background" format="default" sectionFormat="of" derivedContent="EDGE-COMPUTING-BACKGROUND"/>.</t>
      <t indent="0" pn="section-1-4">This document represents the consensus of the Thing-to-Thing Research Group (T2TRG). It has been reviewed extensively by the research group members who are actively involved in the research and development of the technology covered by this document. It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="background" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-background">Background</name>
      <section anchor="internet-of-things-iot" numbered="true" removeInRFC="false" toc="include" pn="section-2.1">
        <name slugifiedName="name-internet-of-things-iot">Internet of Things (IoT)</name>
        <t indent="0" pn="section-2.1-1">Since the term "Internet of Things" was coined by Kevin Ashton in 1999 while working on Radio-Frequency Identification (RFID) technology <xref target="Ashton" format="default" sectionFormat="of" derivedContent="Ashton"/>, the concept of IoT has evolved. At the time of writing, it reflects a vision of connecting the physical world to the virtual world of computers using (often wireless) networks over which things can send and receive information without human intervention.  Recently, the term has become more literal by connecting things to the Internet and converging on Internet and web technologies.</t>
        <t indent="0" pn="section-2.1-2">A "Thing" is a physical item made available in the IoT, thereby enabling digital interaction with the physical world for humans, services, and/or other Things <xref target="I-D.irtf-t2trg-rest-iot" format="default" sectionFormat="of" derivedContent="REST-IOT"/>. In this document, we will use the term "IoT device" to designate the embedded system attached to the Thing.</t>
        <t indent="0" pn="section-2.1-3">Resource-constrained Things, such as sensors, home appliances, and wearable devices, often have limited storage and processing power, which can create challenges with respect to reliability, performance, energy consumption, security, and privacy <xref target="Lin" format="default" sectionFormat="of" derivedContent="Lin"/>. Some, less-resource-constrained Things, can generate a voluminous amount of data. This range of factors led to IoT designs that integrate Things into larger distributed systems, for example, edge or cloud computing systems.</t>
      </section>
      <section anchor="cloud-computing" numbered="true" removeInRFC="false" toc="include" pn="section-2.2">
        <name slugifiedName="name-cloud-computing">Cloud Computing</name>
        <t indent="0" pn="section-2.2-1">Cloud computing has been defined in <xref target="NIST" format="default" sectionFormat="of" derivedContent="NIST"/>:</t>
        <blockquote pn="section-2.2-2">Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.</blockquote>
        <t indent="0" pn="section-2.2-3">The low cost and massive availability of storage and processing power enabled the realization of another computing model in which virtualized resources can be leased in an on-demand fashion and provided as general utilities. Platform-as-a-Service (PaaS) and cloud computing platforms widely adopted this paradigm for delivering services over the Internet, gaining both economical and technical benefits <xref target="Botta" format="default" sectionFormat="of" derivedContent="Botta"/>.</t>
        <t indent="0" pn="section-2.2-4">At the time of writing, an unprecedented volume and variety of data is generated by Things, and applications deployed at the network edge consume this data.  In this context, cloud-based service models are not suitable for some classes of applications that require very short response times, require access to local personal data, or generate vast amounts of data.  These applications may instead leverage edge computing.</t>
      </section>
      <section anchor="edge-computing" numbered="true" removeInRFC="false" toc="include" pn="section-2.3">
        <name slugifiedName="name-edge-computing">Edge Computing</name>
        <t indent="0" pn="section-2.3-1">Edge computing, also referred to as "fog computing" in some settings, is a new paradigm in which substantial computing and storage resources are placed at the edge of the Internet, close to mobile devices, sensors, actuators, or machines.  Edge computing happens near data sources <xref target="Mahadev" format="default" sectionFormat="of" derivedContent="Mahadev"/> as well as close to where decisions are made or where interactions with the physical world take place ("close" here can refer to a distance that is topological, physical, latency-based, etc.).  It processes both downstream data (originating from cloud services) and upstream data (originating from end devices or network elements).  The term "fog computing" usually represents the notion of multi-tiered edge computing, that is, several layers of compute infrastructure between end devices and cloud services.</t>
        <t indent="0" pn="section-2.3-2">An edge device is any computing or networking resource residing between end-device data sources and cloud-based data centers.  In edge computing, end devices consume and produce data. At the network edge, devices not only request services and information from the cloud but also handle computing tasks including processing, storing, caching, and load balancing on data sent to and from the cloud <xref target="Shi" format="default" sectionFormat="of" derivedContent="Shi"/>.  This does not preclude end devices from hosting computation themselves, when possible, independently or as part of a distributed edge computing platform.</t>
        <t indent="0" pn="section-2.3-3">Several Standards Developing Organizations (SDOs) and industry forums have provided definitions of edge and fog computing:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.3-4">
          <li pn="section-2.3-4.1">ISO defines edge computing as a "form of distributed computing in which significant processing and data storage takes place on nodes which are at the edge of the network" <xref target="ISO_TR" format="default" sectionFormat="of" derivedContent="ISO_TR"/>.</li>
          <li pn="section-2.3-4.2">ETSI defines multi-access edge computing as a "system which provides an IT service environment and cloud-computing capabilities at the edge of an access network which contains one or more type of access technology, and in close proximity to its users" <xref target="ETSI_MEC_01" format="default" sectionFormat="of" derivedContent="ETSI_MEC_01"/>.</li>
          <li pn="section-2.3-4.3">The Industry IoT Consortium (IIC) (now incorporating what was formerly OpenFog) defines fog computing as "a horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum" <xref target="OpenFog" format="default" sectionFormat="of" derivedContent="OpenFog"/>.</li>
        </ul>
        <t indent="0" pn="section-2.3-5">Based on these definitions, we can summarize a general philosophy of edge computing as distributing the required functions close to users and data, while the difference to classic local systems is the usage of management and orchestration features adopted from cloud computing.</t>
        <t indent="0" pn="section-2.3-6">Actors from various industries approach edge computing using different terms and reference models, although, in practice, these approaches are not incompatible and may integrate with each other:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.3-7">
          <li pn="section-2.3-7.1">The telecommunication industry tends to use a model where edge computing services are deployed over a Network Function Virtualization (NFV) infrastructure, at aggregation points, or in proximity to the user equipment (e.g., gNodeBs) <xref target="ETSI_MEC_03" format="default" sectionFormat="of" derivedContent="ETSI_MEC_03"/>.</li>
          <li pn="section-2.3-7.2">Enterprise and campus solutions often interpret edge computing as an "edge cloud", that is, a smaller data center directly connected to the local network (often referred to as "on-premise").</li>
          <li pn="section-2.3-7.3">The automation industry defines the edge as the connection point between IT and Operational Technology (OT). Hence, edge computing sometimes refers to applying IT solutions to OT problems, such as analytics, more-flexible user interfaces, or simply having more computing power than an automation controller.</li>
        </ul>
      </section>
      <section anchor="sec-uc" numbered="true" removeInRFC="false" toc="include" pn="section-2.4">
        <name slugifiedName="name-examples-of-iot-edge-comput">Examples of IoT Edge Computing Use Cases</name>
        <t indent="0" pn="section-2.4-1">IoT edge computing can be used in home, industry, grid, healthcare, city, transportation, agriculture, and/or educational scenarios. Here, we discuss only a few examples of such use cases to identify differentiating requirements, providing references to other use cases.</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-2.4-2">
          <dt pn="section-2.4-2.1"><strong>Smart Factory</strong></dt>
          <dd pn="section-2.4-2.2">
            <t indent="0" pn="section-2.4-2.2.1">As part of the Fourth Industrial Revolution, smart factories run real-time processes based on IT technologies, such as artificial intelligence and big data. Even a very small environmental change in a smart factory can lead to a situation in which production efficiency decreases or product quality problems occur. Therefore, simple but time-sensitive processing can be performed at the edge, for example, controlling the temperature and humidity in the factory or operating machines based on the real-time collection of the operational status of each machine. However, data requiring highly precise analysis, such as machine life-cycle management or accident risk prediction, can be transferred to a central data center for processing.</t>
            <t indent="0" pn="section-2.4-2.2.2">The use of edge computing in a smart factory <xref target="Argungu" format="default" sectionFormat="of" derivedContent="Argungu"/> can reduce the cost of network and storage resources by reducing the communication load to the central data center or server. It is also possible to improve process efficiency and facility asset productivity through real-time prediction of failures and to reduce the cost of failure through preliminary measures. In the existing manufacturing field, production facilities are manually run according to a program entered in advance; however, edge computing in a smart factory enables tailoring solutions by analyzing data at each production facility and machine level. Digital twins <xref target="Jones" format="default" sectionFormat="of" derivedContent="Jones"/> of IoT devices have been jointly used with edge computing in industrial IoT scenarios <xref target="Chen" format="default" sectionFormat="of" derivedContent="Chen"/>.</t>
          </dd>
          <dt pn="section-2.4-2.3"><strong>Smart Grid</strong></dt>
          <dd pn="section-2.4-2.4">
            <t indent="0" pn="section-2.4-2.4.1">In future smart-city scenarios, the smart grid will be critical in ensuring highly available and efficient energy control in city-wide electricity management <xref target="Mehmood" format="default" sectionFormat="of" derivedContent="Mehmood"/>.  Edge computing is expected to play a significant role in these systems to improve the transmission efficiency of electricity, to react to and restore power after a disturbance, to reduce operation costs, and to reuse energy effectively since these operations involve local decision-making. In addition, edge computing can help monitor power generation and power demand and make local electrical energy storage decisions in smart grid systems.</t>
          </dd>
          <dt pn="section-2.4-2.5"><strong>Smart Agriculture</strong></dt>
          <dd pn="section-2.4-2.6">
            <t indent="0" pn="section-2.4-2.6.1">Smart agriculture integrates information and communication technologies with farming technology. Intelligent farms use IoT technology to measure and analyze parameters, such as the temperature, humidity, sunlight, carbon dioxide, and soil quality, in crop cultivation facilities. Depending on the analysis results, control devices are used to set the environmental parameters to an appropriate state. Remote management is also possible through mobile devices, such as smartphones.</t>
            <t indent="0" pn="section-2.4-2.6.2">In existing farms, simple systems, such as management according to temperature and humidity, can be easily and inexpensively implemented using IoT technology <xref target="Tanveer" format="default" sectionFormat="of" derivedContent="Tanveer"/>. Field sensors gather data on field and crop condition. This data is then transmitted to cloud servers that process data and recommend actions. The use of edge computing can reduce the volume of back-and-forth data transmissions significantly, resulting in cost and bandwidth savings. Locally generated data can be processed at the edge, and local computing and analytics can drive local actions. With edge computing, it is easy for farmers to select large amounts of data for processing, and data can be analyzed even in remote areas with poor access conditions. Other applications include enabling dashboarding, for example, to visualize the farm status, as well as enhancing Extended Reality (XR) applications that require edge audio and/or video processing. As the number of people working on farming has been decreasing over time, increasing automation enabled by edge computing can be a driving force for future smart agriculture <xref target="OGrady" format="default" sectionFormat="of" derivedContent="OGrady"/>.</t>
          </dd>
          <dt pn="section-2.4-2.7"><strong>Smart Construction</strong></dt>
          <dd pn="section-2.4-2.8">
            <t indent="0" pn="section-2.4-2.8.1">Safety is critical at construction sites. Every year, many construction workers lose their lives because of falls, collisions, electric shocks, and other accidents <xref target="BigRentz" format="default" sectionFormat="of" derivedContent="BigRentz"/>.  Therefore, solutions have been developed to improve construction site safety, including the real-time identification of workers, monitoring of equipment location, and predictive accident prevention. To deploy these solutions, many cameras and IoT sensors have been installed on construction sites to measure noise, vibration, gas concentration, etc. Typically, the data generated from these measurements is collected in on-site gateways and sent to remote cloud servers for storage and analysis. Thus, an inspector can check the information stored on the cloud server to investigate an incident. However, this approach can be expensive because of transmission costs (for example, of video streams over a mobile network connection) and because usage fees of private cloud services.</t>
            <t indent="0" pn="section-2.4-2.8.2">Using edge computing <xref target="Yue" format="default" sectionFormat="of" derivedContent="Yue"/>, data generated at the construction site can be processed and analyzed on an edge server located within or near the site. Only the result of this processing needs to be transferred to a cloud server, thus reducing transmission costs. It is also possible to locally generate warnings to prevent accidents in real time.</t>
          </dd>
          <dt pn="section-2.4-2.9"><strong>Self-Driving Car</strong></dt>
          <dd pn="section-2.4-2.10">
            <t indent="0" pn="section-2.4-2.10.1">Edge computing plays a crucial role in safety-focused self-driving car systems <xref target="Badjie" format="default" sectionFormat="of" derivedContent="Badjie"/>. With a multitude of sensors, such as high-resolution cameras, radars, Light Detection and Ranging (LiDAR) systems, sonar sensors, and GPS systems, autonomous vehicles generate vast amounts of real-time data. Local processing utilizing edge computing nodes allows for efficient collection and analysis of this data to monitor vehicle distances and road conditions and respond promptly to unexpected situations. Roadside computing nodes can also be leveraged to offload tasks when necessary, for example, when the local processing capacity of the car is insufficient because of hardware constraints or a large data volume.</t>
            <t indent="0" pn="section-2.4-2.10.2">For instance, when the car ahead slows, a self-driving car adjusts its speed to maintain a safe distance, or when a roadside signal changes, it adapts its behavior accordingly. In another example, cars equipped with self-parking features utilize local processing to analyze sensor data, determine suitable parking spots, and execute precise parking maneuvers without relying on external processing or connectivity. It is also possible to use in-cabin cameras coupled with local processing to monitor the driver's attention level and detect signs of drowsiness or distraction. The system can issue warnings or implement preventive measures to ensure driver safety.</t>
            <t indent="0" pn="section-2.4-2.10.3">Edge computing empowers self-driving cars by enabling real-time processing, reducing latency, enhancing data privacy, and optimizing bandwidth usage. By leveraging local processing capabilities, self-driving cars can make rapid decisions, adapt to changing environments, and ensure safer and more efficient autonomous driving experiences.</t>
          </dd>
          <dt pn="section-2.4-2.11"><strong>Digital Twin</strong></dt>
          <dd pn="section-2.4-2.12">
            <t indent="0" pn="section-2.4-2.12.1">A digital twin can simulate different scenarios and predict outcomes based on real-time data collected from the physical environment. This simulation capability empowers proactive maintenance, optimization of operations, and the prediction of potential issues or failures. Decision makers can use digital twins to test and validate different strategies, identify inefficiencies, and optimize performance <xref target="CertMagic" format="default" sectionFormat="of" derivedContent="CertMagic"/>.</t>
            <t indent="0" pn="section-2.4-2.12.2">With edge computing, real-time data is collected, processed, and analyzed directly at the edge, allowing for the accurate monitoring and simulation of physical assets. Moreover, edge computing effectively minimizes latency, enabling rapid responses to dynamic conditions as computational resources are brought closer to the physical object. Running digital twin processing at the edge enables organizations to obtain timely insights and make informed decisions that maximize efficiency and performance.</t>
          </dd>
          <dt pn="section-2.4-2.13"><strong>Other Use Cases</strong></dt>
          <dd pn="section-2.4-2.14">
            <t indent="0" pn="section-2.4-2.14.1">Artificial intelligence (AI) and machine learning (ML) systems at the edge empower real-time analysis, faster decision-making, reduced latency, improved operational efficiency, and personalized experiences across various industries by bringing AI and ML capabilities closer to edge devices.</t>
            <t indent="0" pn="section-2.4-2.14.2">In addition, oneM2M has studied several IoT edge computing use cases, which are documented in <xref target="oneM2M-TR0001" format="default" sectionFormat="of" derivedContent="oneM2M-TR0001"/>, <xref target="oneM2M-TR0018" format="default" sectionFormat="of" derivedContent="oneM2M-TR0018"/>, and <xref target="oneM2M-TR0026" format="default" sectionFormat="of" derivedContent="oneM2M-TR0026"/>. The edge-computing-related requirements raised through the analysis of these use cases are captured in <xref target="oneM2M-TS0002" format="default" sectionFormat="of" derivedContent="oneM2M-TS0002"/>.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-challenges" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-iot-challenges-leading-towa">IoT Challenges Leading toward Edge Computing</name>
      <t indent="0" pn="section-3-1">This section describes the challenges faced by the IoT that are motivating the adoption of edge computing. These are distinct from the research challenges applicable to IoT edge computing, some of which are mentioned in <xref target="sec-functions" format="default" sectionFormat="of" derivedContent="Section 4"/>.</t>
      <t indent="0" pn="section-3-2">IoT technology is used with increasingly demanding applications in
   domains such as industrial, automotive, and healthcare, which leads
   to new challenges.  For example, industrial machines, such as laser cutters, produce over 1 terabyte of data per hour, and similar amounts can be generated in autonomous cars <xref target="NVIDIA" format="default" sectionFormat="of" derivedContent="NVIDIA"/>.  90% of IoT data is expected to be stored, processed, analyzed, and acted upon close to the source <xref target="Kelly" format="default" sectionFormat="of" derivedContent="Kelly"/>, as cloud computing models alone cannot address these new challenges <xref target="Chiang" format="default" sectionFormat="of" derivedContent="Chiang"/>.</t>
      <t indent="0" pn="section-3-3">Below, we discuss IoT use case requirements that are moving cloud capabilities to be more proximate, distributed, and disaggregated.</t>
      <section anchor="time-sensitivity" numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-time-sensitivity">Time Sensitivity</name>
        <t indent="0" pn="section-3.1-1">Often, many industrial control systems, such as manufacturing systems, smart grids, and oil and gas systems, require stringent end-to-end latency between the sensor and control nodes.  While some IoT applications may require latency below a few tens of milliseconds <xref target="Weiner" format="default" sectionFormat="of" derivedContent="Weiner"/>, industrial robots and motion control systems have use cases for cycle times in the order of microseconds <xref target="IEC_IEEE_60802" format="default" sectionFormat="of" derivedContent="IEC_IEEE_60802"/>.  In some cases, speed-of-light limitations may simply prevent cloud-based solutions; however, this is not the only challenge relative to time sensitivity.  Guarantees for bounded latency and jitter (<xref target="RFC8578" sectionFormat="comma" section="7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8578#section-7" derivedContent="RFC8578"/>) are also important for industrial IoT applications.  This means that control packets must arrive with as little variation as possible and within a strict deadline.  Given the best-effort characteristics of the Internet, this challenge is virtually impossible to address without using end-to-end guarantees for individual message delivery and continuous data flows.</t>
      </section>
      <section anchor="connectivity-cost" numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-connectivity-cost">Connectivity Cost</name>
        <t indent="0" pn="section-3.2-1">Some IoT deployments may not face bandwidth constraints when uploading data to the cloud.  Theoretically, both 5G and Wi-Fi 6 networks top out at 10 gigabits per second (i.e., 4.5 terabytes per hour), allowing the transfer of large amounts of uplink data.  However, the cost of maintaining continuous high-bandwidth connectivity for such usage is unjustifiable and impractical for most IoT applications.  In some settings, for example, in aeronautical communication, higher communication costs reduce the amount of data that can be practically uploaded even further.  Therefore, minimizing reliance on high-bandwidth connectivity is a requirement; this can be done, for example, by processing data at the edge and deriving summarized or actionable insights that can be transmitted to the cloud.</t>
      </section>
      <section anchor="resilience-to-intermittent-services" numbered="true" removeInRFC="false" toc="include" pn="section-3.3">
        <name slugifiedName="name-resilience-to-intermittent-">Resilience to Intermittent Services</name>
        <t indent="0" pn="section-3.3-1">Many IoT devices, such as sensors, actuators, and controllers, have very limited hardware resources and cannot rely solely on their own resources to meet their computing and/or storage needs.  They require reliable, uninterrupted, or resilient services to augment their capabilities to fulfill their application tasks.  This is difficult and partly impossible to achieve using cloud services for systems such as vehicles, drones, or oil rigs that have intermittent network connectivity. Conversely, a cloud backend might want to access device data
   even if the device is currently asleep.</t>
      </section>
      <section anchor="sec-priv" numbered="true" removeInRFC="false" toc="include" pn="section-3.4">
        <name slugifiedName="name-privacy-and-security">Privacy and Security</name>
        <t indent="0" pn="section-3.4-1">When IoT services are deployed at home, personal information can be learned from detected usage data.  For example, one can extract information about employment, family status, age, and income by analyzing smart meter data <xref target="ENERGY" format="default" sectionFormat="of" derivedContent="ENERGY"/>.  Policy makers have begun to provide frameworks that limit the usage of personal data and impose strict requirements on data controllers and processors.  Data stored indefinitely in the cloud also increases the risk of data leakage, for instance, through attacks on rich targets.</t>
        <t indent="0" pn="section-3.4-2">It is often argued that industrial systems do not provide privacy implications, as no personal data is gathered.  However, data from such systems is often highly sensitive, as one might be able to infer trade secrets, such as the setup of production lines.  Hence, owners of these systems are generally reluctant to upload IoT data to the cloud.</t>
        <t indent="0" pn="section-3.4-3">Furthermore, passive observers can perform traffic analysis on device-to-cloud paths.  Therefore, hiding traffic patterns associated with sensor networks can be another requirement for edge computing.</t>
      </section>
    </section>
    <section anchor="sec-functions" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-iot-edge-computing-function">IoT Edge Computing Functions</name>
      <t indent="0" pn="section-4-1">We first look at the current state of IoT edge computing (<xref target="sec-overview" format="default" sectionFormat="of" derivedContent="Section 4.1"/>) and then define a general system model (<xref target="sec-model" format="default" sectionFormat="of" derivedContent="Section 4.2"/>). This provides a context for IoT edge computing functions, which are listed in Sections <xref target="sec-components-oam" format="counter" sectionFormat="of" derivedContent="4.3"/>, <xref target="sec-components-functional" format="counter" sectionFormat="of" derivedContent="4.4"/>, and <xref target="sec-components-app" format="counter" sectionFormat="of" derivedContent="4.5"/>.</t>
      <section anchor="sec-overview" numbered="true" removeInRFC="false" toc="include" pn="section-4.1">
        <name slugifiedName="name-overview-of-iot-edge-comput">Overview of IoT Edge Computing</name>
        <t indent="0" pn="section-4.1-1">This section provides an overview of the current (at the time of writing) IoT edge computing field based on a limited review of standards, research, and open-source and proprietary products in <xref target="I-D.defoy-t2trg-iot-edge-computing-background" format="default" sectionFormat="of" derivedContent="EDGE-COMPUTING-BACKGROUND"/>.</t>
        <t indent="0" pn="section-4.1-2">IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) and proprietary products, represent a common class of IoT edge computing products, where the gateway provides a local service on customer premises and is remotely managed through a cloud service. IoT communication protocols are typically used between IoT devices and the gateway, including a Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/>, Message Queuing Telemetry Transport (MQTT) <xref target="MQTT5" format="default" sectionFormat="of" derivedContent="MQTT5"/>, and many specialized IoT protocols (such as  Open Platform Communications Unified Architecture (OPC UA) and Data Distribution Service (DDS) in the industrial IoT space), while the gateway communicates with the distant cloud typically using HTTPS. Virtualization platforms enable the deployment of virtual edge computing functions (using Virtual Machines (VMs) and application containers), including IoT gateway software, on servers in the mobile network infrastructure (at base stations and concentration points), edge data centers (in central offices), and regional data centers located near central offices. End devices are envisioned to become computing devices in forward-looking projects but are not commonly used at the time of writing.</t>
        <t indent="0" pn="section-4.1-3">In addition to open-source and proprietary solutions, a horizontal IoT service layer is standardized by the oneM2M standards body to reduce fragmentation, increase interoperability, and promote reuse in the IoT ecosystem. Furthermore, ETSI Multi-access Edge Computing (MEC) developed an IoT API <xref target="ETSI_MEC_33" format="default" sectionFormat="of" derivedContent="ETSI_MEC_33"/> that enables the deployment of heterogeneous IoT platforms and provides a means to configure the various components of an IoT system.</t>
        <t indent="0" pn="section-4.1-4">Physical or virtual IoT gateways can host application programs that are typically built using an SDK to access local services through a programmatic API.  Edge cloud system operators host their customers' application VMs or containers on servers located in or near access networks that can implement local edge services. For example, mobile networks can provide edge services for radio network information, location, and bandwidth management.</t>
        <t indent="0" pn="section-4.1-5">Resilience in the IoT can entail the ability to operate autonomously in periods of disconnectedness to preserve the integrity and safety of the controlled system, possibly in a degraded mode. IoT devices and gateways are often expected to operate in always-on and unattended modes, using fault detection and unassisted recovery functions.</t>
        <t indent="0" pn="section-4.1-6">The life-cycle management of services and applications on physical IoT gateways is generally cloud based.  Edge cloud management platforms and products (such as StarlingX, Akraino Edge Stack, or proprietary products from major cloud providers) adapt cloud management technologies (e.g., Kubernetes) to the edge cloud, that is, to smaller, distributed computing devices running outside a controlled data center.  Typically, the service and application life cycle is using an NFV-like management and orchestration model.</t>
        <t indent="0" pn="section-4.1-7">   The platform generally enables advertising or consuming services
   hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports
   service discovery and communication), and enables communication with
   local and remote endpoints (e.g., message routing function in IoT
   gateways).  The platform is usually extensible to edge applications
   because it can advertise a service that other edge applications can
   consume.  The IoT communication services include protocol translation, analytics, and transcoding.  Communication between edge computing devices is enabled in tiered or distributed deployments.</t>
        <t indent="0" pn="section-4.1-8">An edge cloud platform may enable pass-through without storage or local storage (e.g., on IoT gateways). Some edge cloud platforms use distributed storage such as that provided by a distributed storage platform (e.g., EdgeFS and Ceph) or, in more experimental settings, by an Information-Centric Networking (ICN) network, for example, systems such as Chipmunk <xref target="Chipmunk" format="default" sectionFormat="of" derivedContent="Chipmunk"/> and Kua <xref target="Kua" format="default" sectionFormat="of" derivedContent="Kua"/> have been proposed as distributed information-centric objects stores.  External storage, for example, on databases in a distant or local IT cloud, is typically used for filtered data deemed worthy of long-term storage; although, in some cases, it may be for all data, for example, when required for regulatory reasons.</t>
        <t indent="0" pn="section-4.1-9">Stateful computing is the default on most systems, VMs, and containers. Stateless computing is supported on platforms providing a "serverless computing" service (also known as function-as-a-service, e.g., using stateless containers) or on systems based on named function networking.</t>
        <t indent="0" pn="section-4.1-10">In many IoT use cases, a typical network usage pattern is a high-volume uplink with some form of traffic reduction enabled by processing over edge computing devices. Alternatives to traffic reduction include deferred transmission (to off-peak hours or using physical shipping). Downlink traffic includes application control and software updates. Downlink-heavy traffic patterns are not excluded but are more often associated with non-IoT usage (e.g., video Content Delivery Networks (CDNs)).</t>
      </section>
      <section anchor="sec-model" numbered="true" removeInRFC="false" toc="include" pn="section-4.2">
        <name slugifiedName="name-general-model">General Model</name>
        <t indent="0" pn="section-4.2-1">Edge computing is expected to play an important role in deploying new IoT services integrated with big data and AI enabled by flexible in-network computing platforms.  Although there are many approaches to
   edge computing, this section lays out an attempt at a general
   model and lists associated logical functions. In practice, this model can be mapped to different architectures, such as:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-2">
          <li pn="section-4.2-2.1">A single IoT gateway, or a hierarchy of IoT gateways, typically connected to the cloud (e.g., to extend the centralized cloud-based management of IoT devices and data to the edge). The IoT gateway plays a common role in providing access to a heterogeneous set of IoT devices and sensors, handling IoT data, and delivering IoT data to its final destination in a cloud network.  An IoT gateway requires interactions with the cloud; however, it can also operate independently in a disconnected mode.</li>
          <li pn="section-4.2-2.2">A set of distributed computing nodes, for example, embedded in switches, routers, edge cloud servers, or mobile devices. Some IoT devices have sufficient computing capabilities to participate in such distributed systems owing to advances in hardware technology. In this model, edge computing nodes can collaborate to share resources.</li>
          <li pn="section-4.2-2.3">A hybrid system involving both IoT gateways and supporting functions in distributed computing nodes.</li>
        </ul>
        <t indent="0" pn="section-4.2-3">In the general model described in <xref target="rl-fig1" format="default" sectionFormat="of" derivedContent="Figure 1"/>, the edge computing domain is interconnected with IoT devices (southbound connectivity), possibly with a remote (e.g., cloud) network (northbound connectivity), and with a service operator's system.  Edge computing nodes provide multiple logical functions or components that may not be present in a given system. They may be implemented in a centralized or distributed fashion, at the network edge, or through interworking between the edge network and remote cloud networks.</t>
        <figure anchor="rl-fig1" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-model-of-iot-edge-computing">Model of IoT Edge Computing</name>
          <artset pn="section-4.2-4.1">
            <artwork type="svg" align="center" pn="section-4.2-4.1.1"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" viewBox="0 0 700 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,128 L 8,528" fill="none" stroke="black"/>
                <path d="M 24,576 L 24,624" fill="none" stroke="black"/>
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 64,528 L 64,576" fill="none" stroke="black"/>
                <path d="M 96,576 L 96,624" fill="none" stroke="black"/>
                <path d="M 128,80 L 128,128" fill="none" stroke="black"/>
                <path d="M 136,576 L 136,624" fill="none" stroke="black"/>
                <path d="M 184,528 L 184,576" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,80" fill="none" stroke="black"/>
                <path d="M 208,576 L 208,624" fill="none" stroke="black"/>
                <path d="M 232,48 L 232,96" fill="none" stroke="black"/>
                <path d="M 272,560 L 272,624" fill="none" stroke="black"/>
                <path d="M 288,96 L 288,128" fill="none" stroke="black"/>
                <path d="M 320,528 L 320,560" fill="none" stroke="black"/>
                <path d="M 344,560 L 344,624" fill="none" stroke="black"/>
                <path d="M 360,48 L 360,96" fill="none" stroke="black"/>
                <path d="M 384,128 L 384,544" fill="none" stroke="black"/>
                <path d="M 32,32 L 208,32" fill="none" stroke="black"/>
                <path d="M 232,48 L 360,48" fill="none" stroke="black"/>
                <path d="M 32,80 L 208,80" fill="none" stroke="black"/>
                <path d="M 232,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 384,128" fill="none" stroke="black"/>
                <path d="M 8,528 L 248,528" fill="none" stroke="black"/>
                <path d="M 312,528 L 328,528" fill="none" stroke="black"/>
                <path d="M 272,560 L 344,560" fill="none" stroke="black"/>
                <path d="M 24,576 L 96,576" fill="none" stroke="black"/>
                <path d="M 136,576 L 208,576" fill="none" stroke="black"/>
                <path d="M 24,624 L 96,624" fill="none" stroke="black"/>
                <path d="M 136,624 L 208,624" fill="none" stroke="black"/>
                <path d="M 272,624 L 344,624" fill="none" stroke="black"/>
                <g class="text">
                  <text x="84" y="52">Remote</text>
                  <text x="144" y="52">Network</text>
                  <text x="60" y="68">(e.g.,</text>
                  <text x="112" y="68">cloud</text>
                  <text x="172" y="68">network)</text>
                  <text x="288" y="68">Service</text>
                  <text x="292" y="84">Operator</text>
                  <text x="124" y="148">Edge</text>
                  <text x="184" y="148">Computing</text>
                  <text x="252" y="148">Domain</text>
                  <text x="48" y="180">One</text>
                  <text x="76" y="180">or</text>
                  <text x="108" y="180">more</text>
                  <text x="168" y="180">computing</text>
                  <text x="232" y="180">nodes</text>
                  <text x="52" y="196">(IoT</text>
                  <text x="108" y="196">gateway,</text>
                  <text x="160" y="196">end</text>
                  <text x="212" y="196">devices,</text>
                  <text x="288" y="196">switches,</text>
                  <text x="68" y="212">routers,</text>
                  <text x="168" y="212">mini/micro-data</text>
                  <text x="268" y="212">centers,</text>
                  <text x="328" y="212">etc.)</text>
                  <text x="48" y="244">OAM</text>
                  <text x="108" y="244">Components</text>
                  <text x="40" y="260">-</text>
                  <text x="84" y="260">Resource</text>
                  <text x="160" y="260">Discovery</text>
                  <text x="216" y="260">and</text>
                  <text x="292" y="260">Authentication</text>
                  <text x="40" y="276">-</text>
                  <text x="68" y="276">Edge</text>
                  <text x="140" y="276">Organization</text>
                  <text x="208" y="276">and</text>
                  <text x="268" y="276">Federation</text>
                  <text x="40" y="292">-</text>
                  <text x="104" y="292">Multi-Tenancy</text>
                  <text x="176" y="292">and</text>
                  <text x="232" y="292">Isolation</text>
                  <text x="40" y="308">-</text>
                  <text x="64" y="308">...</text>
                  <text x="76" y="340">Functional</text>
                  <text x="164" y="340">Components</text>
                  <text x="40" y="356">-</text>
                  <text x="92" y="356">In-Network</text>
                  <text x="184" y="356">Computation</text>
                  <text x="40" y="372">-</text>
                  <text x="68" y="372">Edge</text>
                  <text x="120" y="372">Caching</text>
                  <text x="40" y="388">-</text>
                  <text x="104" y="388">Communication</text>
                  <text x="40" y="404">-</text>
                  <text x="72" y="404">Other</text>
                  <text x="132" y="404">Services</text>
                  <text x="40" y="420">-</text>
                  <text x="64" y="420">...</text>
                  <text x="80" y="452">Application</text>
                  <text x="172" y="452">Components</text>
                  <text x="40" y="468">-</text>
                  <text x="64" y="468">IoT</text>
                  <text x="112" y="468">Devices</text>
                  <text x="188" y="468">Management</text>
                  <text x="40" y="484">-</text>
                  <text x="68" y="484">Data</text>
                  <text x="132" y="484">Management</text>
                  <text x="192" y="484">and</text>
                  <text x="248" y="484">Analytics</text>
                  <text x="40" y="500">-</text>
                  <text x="64" y="500">...</text>
                  <text x="264" y="532">-</text>
                  <text x="280" y="532">-</text>
                  <text x="296" y="532">-</text>
                  <text x="344" y="532">-</text>
                  <text x="360" y="532">-</text>
                  <text x="376" y="532">-</text>
                  <text x="248" y="548">|</text>
                  <text x="248" y="580">|</text>
                  <text x="304" y="580">Compute</text>
                  <text x="384" y="580">|</text>
                  <text x="56" y="596">End</text>
                  <text x="168" y="596">End</text>
                  <text x="232" y="596">...</text>
                  <text x="308" y="596">Node/End</text>
                  <text x="52" y="612">Device</text>
                  <text x="88" y="612">1</text>
                  <text x="164" y="612">Device</text>
                  <text x="200" y="612">2</text>
                  <text x="236" y="612">...|</text>
                  <text x="300" y="612">Device</text>
                  <text x="336" y="612">n</text>
                  <text x="384" y="612">|</text>
                  <text x="248" y="644">+</text>
                  <text x="264" y="644">-</text>
                  <text x="280" y="644">-</text>
                  <text x="296" y="644">-</text>
                  <text x="312" y="644">-</text>
                  <text x="328" y="644">-</text>
                  <text x="344" y="644">-</text>
                  <text x="360" y="644">-</text>
                  <text x="380" y="644">-+</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center" pn="section-4.2-4.1.2">
   +---------------------+
   |   Remote Network    |  +---------------+
   |(e.g., cloud network)|  |   Service     |
   +-----------+---------+  |   Operator    |
               |            +------+--------+
               |                   |
+--------------+-------------------+-----------+
|            Edge Computing Domain             |
|                                              |
|   One or more computing nodes                |
|   (IoT gateway, end devices, switches,       |
|   routers, mini/micro-data centers, etc.)    |
|                                              |
|   OAM Components                             |
|   - Resource Discovery and Authentication    |
|   - Edge Organization and Federation         |
|   - Multi-Tenancy and Isolation              |
|   - ...                                      |
|                                              |
|   Functional Components                      |
|   - In-Network Computation                   |
|   - Edge Caching                             |
|   - Communication                            |
|   - Other Services                           |
|   - ...                                      |
|                                              |
|   Application Components                     |
|   - IoT Devices Management                   |
|   - Data Management and Analytics            |
|   - ...                                      |
|                                              |
+------+--------------+-------- - - - -+- - - -+
       |              |       |        |       |
       |              |          +-----+--+
  +----+---+    +-----+--+    |  |Compute |    |
  |  End   |    |  End   | ...   |Node/End|
  |Device 1|    |Device 2| ...|  |Device n|    |
  +--------+    +--------+       +--------+
                              + - - - - - - - -+
</artwork>
          </artset>
        </figure>
        <t indent="0" pn="section-4.2-5">In the distributed model described in <xref target="rl-fig2" format="default" sectionFormat="of" derivedContent="Figure 2"/>, the edge computing domain is composed of IoT edge gateways and IoT devices that are also used as computing nodes.  Edge computing domains are connected to a remote (e.g., cloud) network and their respective service operator's system. The computing nodes provide logical functions, for example, as part of distributed machine learning or distributed image processing applications. The processing capabilities in IoT devices are limited; they require the support of other nodes.  In a distributed machine learning application, the training process for AI services can be executed at IoT edge gateways or cloud networks, and the prediction (inference) service is executed in the IoT devices.  Similarly, in a distributed image processing application, some image processing
functions can be executed at the edge or in the cloud. To limit the amount of data to be uploaded to central cloud functions, IoT edge devices may pre-process data.</t>
        <figure anchor="rl-fig2" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-example-of-machine-learning">Example of Machine Learning over a Distributed IoT Edge Computing System</name>
          <artset pn="section-4.2-6.1">
            <artwork type="svg" align="center" pn="section-4.2-6.1.1"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" viewBox="0 0 700 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,352 L 8,560" fill="none" stroke="black"/>
                <path d="M 24,80 L 24,144" fill="none" stroke="black"/>
                <path d="M 24,448 L 24,512" fill="none" stroke="black"/>
                <path d="M 32,176 L 32,208" fill="none" stroke="black"/>
                <path d="M 32,272 L 32,320" fill="none" stroke="black"/>
                <path d="M 32,384 L 32,416" fill="none" stroke="black"/>
                <path d="M 64,144 L 64,176" fill="none" stroke="black"/>
                <path d="M 64,416 L 64,448" fill="none" stroke="black"/>
                <path d="M 96,80 L 96,144" fill="none" stroke="black"/>
                <path d="M 96,448 L 96,512" fill="none" stroke="black"/>
                <path d="M 128,208 L 128,272" fill="none" stroke="black"/>
                <path d="M 128,320 L 128,384" fill="none" stroke="black"/>
                <path d="M 136,80 L 136,144" fill="none" stroke="black"/>
                <path d="M 136,448 L 136,512" fill="none" stroke="black"/>
                <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                <path d="M 176,416 L 176,448" fill="none" stroke="black"/>
                <path d="M 208,80 L 208,144" fill="none" stroke="black"/>
                <path d="M 208,272 L 208,320" fill="none" stroke="black"/>
                <path d="M 208,448 L 208,512" fill="none" stroke="black"/>
                <path d="M 232,272 L 232,320" fill="none" stroke="black"/>
                <path d="M 280,80 L 280,144" fill="none" stroke="black"/>
                <path d="M 280,448 L 280,512" fill="none" stroke="black"/>
                <path d="M 288,208 L 288,272" fill="none" stroke="black"/>
                <path d="M 288,320 L 288,384" fill="none" stroke="black"/>
                <path d="M 320,144 L 320,176" fill="none" stroke="black"/>
                <path d="M 320,416 L 320,448" fill="none" stroke="black"/>
                <path d="M 344,176 L 344,208" fill="none" stroke="black"/>
                <path d="M 344,384 L 344,416" fill="none" stroke="black"/>
                <path d="M 352,80 L 352,144" fill="none" stroke="black"/>
                <path d="M 352,272 L 352,320" fill="none" stroke="black"/>
                <path d="M 352,448 L 352,512" fill="none" stroke="black"/>
                <path d="M 384,32 L 384,240" fill="none" stroke="black"/>
                <path d="M 384,352 L 384,560" fill="none" stroke="black"/>
                <path d="M 8,32 L 384,32" fill="none" stroke="black"/>
                <path d="M 24,80 L 96,80" fill="none" stroke="black"/>
                <path d="M 136,80 L 208,80" fill="none" stroke="black"/>
                <path d="M 280,80 L 352,80" fill="none" stroke="black"/>
                <path d="M 24,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 136,144 L 208,144" fill="none" stroke="black"/>
                <path d="M 280,144 L 352,144" fill="none" stroke="black"/>
                <path d="M 32,176 L 344,176" fill="none" stroke="black"/>
                <path d="M 32,208 L 344,208" fill="none" stroke="black"/>
                <path d="M 8,240 L 384,240" fill="none" stroke="black"/>
                <path d="M 32,272 L 208,272" fill="none" stroke="black"/>
                <path d="M 232,272 L 352,272" fill="none" stroke="black"/>
                <path d="M 32,320 L 208,320" fill="none" stroke="black"/>
                <path d="M 232,320 L 352,320" fill="none" stroke="black"/>
                <path d="M 8,352 L 384,352" fill="none" stroke="black"/>
                <path d="M 32,384 L 344,384" fill="none" stroke="black"/>
                <path d="M 32,416 L 344,416" fill="none" stroke="black"/>
                <path d="M 24,448 L 96,448" fill="none" stroke="black"/>
                <path d="M 136,448 L 208,448" fill="none" stroke="black"/>
                <path d="M 280,448 L 352,448" fill="none" stroke="black"/>
                <path d="M 24,512 L 96,512" fill="none" stroke="black"/>
                <path d="M 136,512 L 208,512" fill="none" stroke="black"/>
                <path d="M 280,512 L 352,512" fill="none" stroke="black"/>
                <path d="M 8,560 L 384,560" fill="none" stroke="black"/>
                <g class="text">
                  <text x="124" y="52">Edge</text>
                  <text x="184" y="52">Computing</text>
                  <text x="252" y="52">Domain</text>
                  <text x="56" y="100">Compute</text>
                  <text x="168" y="100">Compute</text>
                  <text x="312" y="100">Compute</text>
                  <text x="60" y="116">Node/End</text>
                  <text x="172" y="116">Node/End</text>
                  <text x="244" y="116">....</text>
                  <text x="316" y="116">Node/End</text>
                  <text x="52" y="132">Device</text>
                  <text x="88" y="132">1</text>
                  <text x="164" y="132">Device</text>
                  <text x="200" y="132">2</text>
                  <text x="244" y="132">....</text>
                  <text x="308" y="132">Device</text>
                  <text x="344" y="132">m</text>
                  <text x="136" y="196">IoT</text>
                  <text x="172" y="196">Edge</text>
                  <text x="224" y="196">Gateway</text>
                  <text x="84" y="292">Remote</text>
                  <text x="144" y="292">Network</text>
                  <text x="288" y="292">Service</text>
                  <text x="60" y="308">(e.g.,</text>
                  <text x="112" y="308">cloud</text>
                  <text x="172" y="308">network)</text>
                  <text x="296" y="308">Operator(s)</text>
                  <text x="136" y="404">IoT</text>
                  <text x="172" y="404">Edge</text>
                  <text x="224" y="404">Gateway</text>
                  <text x="56" y="468">Compute</text>
                  <text x="168" y="468">Compute</text>
                  <text x="312" y="468">Compute</text>
                  <text x="60" y="484">Node/End</text>
                  <text x="172" y="484">Node/End</text>
                  <text x="244" y="484">....</text>
                  <text x="316" y="484">Node/End</text>
                  <text x="52" y="500">Device</text>
                  <text x="88" y="500">1</text>
                  <text x="164" y="500">Device</text>
                  <text x="200" y="500">2</text>
                  <text x="244" y="500">....</text>
                  <text x="308" y="500">Device</text>
                  <text x="344" y="500">n</text>
                  <text x="124" y="548">Edge</text>
                  <text x="184" y="548">Computing</text>
                  <text x="252" y="548">Domain</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center" pn="section-4.2-6.1.2">
+----------------------------------------------+
|            Edge Computing Domain             |
|                                              |
| +--------+    +--------+        +--------+   |
| |Compute |    |Compute |        |Compute |   |
| |Node/End|    |Node/End|  ....  |Node/End|   |
| |Device 1|    |Device 2|  ....  |Device m|   |
| +----+---+    +----+---+        +----+---+   |
|      |             |                 |       |
|  +---+-------------+-----------------+--+    |
|  |           IoT Edge Gateway           |    |
|  +-----------+-------------------+------+    |
|              |                   |           |
+--------------+-------------------+-----------+
               |                   |
   +-----------+---------+  +------+-------+
   |   Remote Network    |  |   Service    |
   |(e.g., cloud network)|  |  Operator(s) |
   +-----------+---------+  +------+-------+
               |                   |
+--------------+-------------------+-----------+
|              |                   |           |
|  +-----------+-------------------+------+    |
|  |           IoT Edge Gateway           |    |
|  +---+-------------+-----------------+--+    |
|      |             |                 |       |
| +----+---+    +----+---+        +----+---+   |
| |Compute |    |Compute |        |Compute |   |
| |Node/End|    |Node/End|  ....  |Node/End|   |
| |Device 1|    |Device 2|  ....  |Device n|   |
| +--------+    +--------+        +--------+   |
|                                              |
|            Edge Computing Domain             |
+----------------------------------------------+
</artwork>
          </artset>
        </figure>
        <t indent="0" pn="section-4.2-7">In the following, we enumerate major edge computing domain components. Here, they are loosely organized into Operations, Administration, and Maintenance (OAM); functional; and application components, with the understanding that the distinction between these classes may not always be clear, depending on actual system architectures. Some representative research challenges are associated with those functions.  We used input from coauthors, participants of T2TRG meetings, and some comprehensive reviews of the field (<xref target="Yousefpour" format="default" sectionFormat="of" derivedContent="Yousefpour"/>, <xref target="Zhang2" format="default" sectionFormat="of" derivedContent="Zhang2"/>, and <xref target="Khan" format="default" sectionFormat="of" derivedContent="Khan"/>).</t>
      </section>
      <section anchor="sec-components-oam" numbered="true" removeInRFC="false" toc="include" pn="section-4.3">
        <name slugifiedName="name-oam-components">OAM Components</name>
        <t indent="0" pn="section-4.3-1">Edge computing OAM extends beyond the network-related OAM functions listed in <xref target="RFC6291" format="default" sectionFormat="of" derivedContent="RFC6291"/>. In addition to infrastructure (network, storage, and computing resources), edge computing systems can also include computing environments (for VMs, software containers, and functions), IoT devices, data, and code.</t>
        <t indent="0" pn="section-4.3-2">Operation-related functions include performance monitoring for Service Level Agreement (SLA) measurements, fault management, and provisioning for links, nodes, compute and storage resources, platforms, and services. Administration covers network/compute/storage resources, platform and service discovery, configuration, and planning. Discovery during normal operation (e.g., discovery of compute or storage nodes by endpoints) is typically not included in OAM; however, in this document, we do not address it separately. Management covers the monitoring and diagnostics of failures, as well as means to minimize their occurrence and take corrective actions. This may include software update management and high service availability through redundancy and multipath communication. Centralized (e.g., Software-Defined Networking (SDN)) and decentralized management systems can be used. Finally, we arbitrarily chose to address data management as an application component; however, in some systems, data management may be considered similar to a network management function.</t>
        <t indent="0" pn="section-4.3-3">We further detail a few relevant OAM components.</t>
        <section anchor="sec-dis-auth" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.1">
          <name slugifiedName="name-resource-discovery-and-auth">Resource Discovery and Authentication</name>
          <t indent="0" pn="section-4.3.1-1">Discovery and authentication may target platforms and infrastructure resources, such as computing, networking, and storage, as well as other resources, such as IoT devices, sensors, data, code units, services, applications, and users interacting with the system. In a broker-based system, an IoT gateway can act as a broker to discover IoT resources. More decentralized solutions can also be used in replacement of or in complement to the broker-based solutions; for example, CoAP enables multicast discovery of an IoT device and CoAP service discovery enables one to obtain a list of resources made available by this device <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/>. For device authentication, current centralized gateway-based systems rely on the installation of a secret on IoT devices and computing devices (e.g., a device certificate stored in a hardware security module or a combination of code and data stored in a trusted execution environment).</t>
          <t indent="0" pn="section-4.3.1-2">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.3.1-3">
            <li pn="section-4.3.1-3.1">Discovery, authentication, and trust establishment between IoT devices, compute nodes, and platforms, with regard to concerns such as mobility, heterogeneous devices and networks, scale, multiple trust domains, constrained devices, anonymity, and traceability.</li>
            <li pn="section-4.3.1-3.2">Intermittent connectivity to the Internet, removing the need to rely on a third-party authority <xref target="Echeverria" format="default" sectionFormat="of" derivedContent="Echeverria"/>.</li>
            <li pn="section-4.3.1-3.3">Resiliency to failure <xref target="Harchol" format="default" sectionFormat="of" derivedContent="Harchol"/>, denial-of-service attacks, and easier physical access for attackers.</li>
          </ul>
        </section>
        <section anchor="edge-organization-and-federation" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.2">
          <name slugifiedName="name-edge-organization-and-feder">Edge Organization and Federation</name>
          <t indent="0" pn="section-4.3.2-1">In a distributed system context, once edge devices have discovered and authenticated each other, they can be organized or self-organized into hierarchies or clusters. The organizational structure may range from centralized to peer-to-peer, or it may be closely tied to other systems. Such groups can also form federations with other edges or with remote clouds.</t>
          <t indent="0" pn="section-4.3.2-2">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.3.2-3">
            <li pn="section-4.3.2-3.1">Support for scaling and enabling fault tolerance or self-healing <xref target="Jeong" format="default" sectionFormat="of" derivedContent="Jeong"/>. In addition to using a hierarchical organization to cope with scaling, another available and possibly complementary mechanism is multicast <xref target="RFC7390" format="default" sectionFormat="of" derivedContent="RFC7390"/> <xref target="I-D.ietf-core-groupcomm-bis" format="default" sectionFormat="of" derivedContent="CORE-GROUPCOMM-BIS"/>. Other approaches include relying on blockchains <xref target="Ali" format="default" sectionFormat="of" derivedContent="Ali"/>.</li>
            <li pn="section-4.3.2-3.2">Integration of edge computing with virtualized Radio Access Networks (Fog RAN) <xref target="I-D.bernardos-sfc-fog-ran" format="default" sectionFormat="of" derivedContent="SFC-FOG-RAN"/> and 5G access networks.</li>
            <li pn="section-4.3.2-3.3">Sharing resources in multi-vendor and multi-operator scenarios to optimize criteria such as profit <xref target="Anglano" format="default" sectionFormat="of" derivedContent="Anglano"/>, resource usage, latency, and energy consumption.</li>
            <li pn="section-4.3.2-3.4">Capacity planning, placement of infrastructure nodes to minimize delay <xref target="Fan" format="default" sectionFormat="of" derivedContent="Fan"/>, cost, energy, etc.</li>
            <li pn="section-4.3.2-3.5">Incentives for participation, for example, in peer-to-peer federation schemes.</li>
            <li pn="section-4.3.2-3.6">Design of federated AI over IoT edge computing systems <xref target="Brecko" format="default" sectionFormat="of" derivedContent="Brecko"/>, for example, for anomaly detection.</li>
          </ul>
        </section>
        <section anchor="multi-tenancy-and-isolation" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.3">
          <name slugifiedName="name-multi-tenancy-and-isolation">Multi-Tenancy and Isolation</name>
          <t indent="0" pn="section-4.3.3-1">Some IoT edge computing systems make use of virtualized (compute, storage, and networking) resources to address the need for secure multi-tenancy at the edge. This leads to "edge clouds" that share properties with remote clouds and can reuse some of their ecosystems. Virtualization function management is largely covered by ETSI NFV and MEC standards and recommendations. Projects such as <xref target="LFEDGE-EVE" format="default" sectionFormat="of" derivedContent="LFEDGE-EVE"/> further cover virtualization and its management in distributed edge computing settings.</t>
          <t indent="0" pn="section-4.3.3-2">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.3.3-3">
            <li pn="section-4.3.3-3.1">Adapting cloud management platforms to the edge to account for its distributed nature, heterogeneity, need for customization, and limited resources (for example, using Conflict-free Replicated Data Types (CRDTs) <xref target="Jeffery" format="default" sectionFormat="of" derivedContent="Jeffery"/> or intent-based management mechanisms <xref target="Cao" format="default" sectionFormat="of" derivedContent="Cao"/>).</li>
            <li pn="section-4.3.3-3.2">Minimizing virtual function instantiation time and resource usage.</li>
          </ul>
        </section>
      </section>
      <section anchor="sec-components-functional" numbered="true" removeInRFC="false" toc="include" pn="section-4.4">
        <name slugifiedName="name-functional-components">Functional Components</name>
        <section anchor="in-network-computation" numbered="true" removeInRFC="false" toc="include" pn="section-4.4.1">
          <name slugifiedName="name-in-network-computation">In-Network Computation</name>
          <t indent="0" pn="section-4.4.1-1">A core function of IoT edge computing is to enable local computation on a node at the network edge, typically for application-layer processing, such as processing input data from sensors, making local decisions, preprocessing data, and offloading computation on behalf of a device, service, or user. Related functions include orchestrating computation (in a centralized or distributed manner) and managing application life cycles. Support for in-network computation may vary in terms of capability; for example, computing nodes can host virtual machines, software containers, software actors, unikernels running stateful or stateless code, or a rule engine providing an API to register actions in response to conditions (such as an IoT device ID, sensor values to check, thresholds, etc.).</t>
          <t indent="0" pn="section-4.4.1-2">Edge offloading includes offloading to and from an IoT device and to and from a network node. <xref target="Cloudlets" format="default" sectionFormat="of" derivedContent="Cloudlets"/> describes an example of offloading computation from an end device to a network node. In contrast, oneM2M is an example of a system that allows a cloud-based IoT platform to transfer resources and tasks to a target edge node <xref target="oneM2M-TR0052" format="default" sectionFormat="of" derivedContent="oneM2M-TR0052"/>. Once transferred, the edge node can directly support IoT devices that it serves with the service offloaded by the cloud (e.g., group management, location management, etc.).</t>
          <t indent="0" pn="section-4.4.1-3">QoS can be provided in some systems through the combination of network QoS (e.g., traffic engineering or wireless resource scheduling) and compute and storage resource allocations. For example, in some systems, a bandwidth manager service can be exposed to enable allocation of the bandwidth to or from an edge computing application instance.</t>
          <t indent="0" pn="section-4.4.1-4">In-network computation can leverage the underlying services provided using data generated by IoT devices and access networks. Such services include IoT device location, radio network information, bandwidth management, and congestion management (e.g., the congestion management feature of oneM2M <xref target="oneM2M-TR0052" format="default" sectionFormat="of" derivedContent="oneM2M-TR0052"/>).</t>
          <t indent="0" pn="section-4.4.1-5">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.4.1-6">
            <li pn="section-4.4.1-6.1">Computation placement: in a centralized or
   distributed (e.g., peer-to-peer) manner, selecting an appropriate compute
   device.  The selection is based on available resources, location of
   data input and data sinks, compute node properties, etc. with
   varying goals.  These goals include end-to-end latency, privacy, high
   availability, energy conservation, or network efficiency (for
   example, using load-balancing techniques to avoid congestion).</li>
            <li pn="section-4.4.1-6.2">Onboarding code on a platform or computing device and invoking remote code execution, possibly as part of a distributed programming model and with respect to similar concerns of latency, privacy, etc. For example, offloading can be included in a vehicular scenario <xref target="Grewe" format="default" sectionFormat="of" derivedContent="Grewe"/>. These operations should deal with heterogeneous compute nodes <xref target="Schafer" format="default" sectionFormat="of" derivedContent="Schafer"/> and may also support end devices, including IoT devices, as compute nodes <xref target="Larrea" format="default" sectionFormat="of" derivedContent="Larrea"/>.</li>
            <li pn="section-4.4.1-6.3">Adapting Quality of Results (QoR) for applications where a perfect result is not necessary <xref target="Li" format="default" sectionFormat="of" derivedContent="Li"/>.</li>
            <li pn="section-4.4.1-6.4">Assisted or automatic partitioning of code. For example, for application programs <xref target="I-D.sarathchandra-coin-appcentres" format="default" sectionFormat="of" derivedContent="COIN-APPCENTRES"/> or network programs <xref target="I-D.hsingh-coinrg-reqs-p4comp" format="default" sectionFormat="of" derivedContent="REQS-P4COMP"/>.</li>
            <li pn="section-4.4.1-6.5">Supporting computation across trust domains. For example, verifying computation results.</li>
            <li pn="section-4.4.1-6.6">Supporting computation mobility: relocating an instance from one compute node to another while maintaining a given service level; session continuity when communicating with end devices that are mobile, possibly at high speed (e.g., in vehicular scenarios); defining lightweight execution environments for secure code mobility, for example, using WebAssembly <xref target="Nieke" format="default" sectionFormat="of" derivedContent="Nieke"/>.</li>
            <li pn="section-4.4.1-6.7">Defining, managing, and verifying SLAs for edge computing systems; pricing is a challenging task.</li>
          </ul>
        </section>
        <section anchor="edge-storage-and-caching" numbered="true" removeInRFC="false" toc="include" pn="section-4.4.2">
          <name slugifiedName="name-edge-storage-and-caching">Edge Storage and Caching</name>
          <t indent="0" pn="section-4.4.2-1">Local storage or caching enables local data processing (e.g., preprocessing or analysis) as well as delayed data transfer to the cloud or delayed physical shipping.  An edge node may offer local data storage (in which persistence is subject to retention policies), caching, or both.  Generally, "caching" refers to temporary storage to improve performance without persistence guarantees.  An edge-caching component manages data persistence; for example, it schedules the removal of data when it is no longer needed.  Other related aspects include the authentication and encryption of data.  Edge storage and caching can take the form of a distributed storage system.</t>
          <t indent="0" pn="section-4.4.2-2">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.4.2-3">
            <li pn="section-4.4.2-3.1">Cache and data placement: using cache positioning and data placement strategies to minimize data retrieval delay <xref target="Liu" format="default" sectionFormat="of" derivedContent="Liu"/> and energy consumption. Caches may be positioned in the access-network infrastructure or on end devices.</li>
            <li pn="section-4.4.2-3.2">Maintaining consistency, freshness, reliability, and privacy of data stored or cached in systems that are distributed, constrained, and dynamic (e.g., due to node mobility, energy-saving regimes, and disruptions) and which can have additional data governance constraints on data storage location. For example, <xref target="Mortazavi" format="default" sectionFormat="of" derivedContent="Mortazavi"/> describes leveraging a hierarchical storage organization. Freshness-related metrics include the age of information <xref target="Yates" format="default" sectionFormat="of" derivedContent="Yates"/> that captures the timeliness of information received from a sender (e.g., an IoT device).</li>
          </ul>
        </section>
        <section anchor="communication" numbered="true" removeInRFC="false" toc="include" pn="section-4.4.3">
          <name slugifiedName="name-communication">Communication</name>
          <t indent="0" pn="section-4.4.3-1">An edge cloud may provide a northbound data plane or management plane interface to a remote network, such as a cloud, home, or enterprise network. This interface does not exist in stand-alone (local-only) scenarios. To support such an interface when it exists, an edge computing component needs to expose an API, deal with authentication and authorization, and support secure communication.</t>
          <t indent="0" pn="section-4.4.3-2">An edge cloud may provide an API or interface to local or mobile users, for example, to provide access to services and applications or to manage data published by local or mobile devices.</t>
          <t indent="0" pn="section-4.4.3-3">Edge computing nodes communicate with IoT devices over a southbound interface, typically for data acquisition and IoT device management.</t>
          <t indent="0" pn="section-4.4.3-4">Communication brokering is a typical function of IoT edge computing
that facilitates communication with IoT devices, enables clients to
register as recipients for data from devices, forwards
traffic to or from IoT devices, enables various data discovery and
redistribution patterns (for example, north-south with clouds and
east-west with other edge devices <xref target="I-D.mcbride-edge-data-discovery-overview" format="default" sectionFormat="of" derivedContent="EDGE-DATA-DISCOVERY-OVERVIEW"/>).  Another related aspect is dispatching alerts and notifications to interested consumers both inside and outside the edge computing domain.  Protocol translation, analytics, and video transcoding can also be performed when necessary. Communication brokering may be centralized in some systems, for example, using a hub-and-spoke message broker or distributed with message buses, possibly in a layered bus approach.  Distributed systems can leverage direct communication between end devices over device-to-device links.  A broker can ensure communication reliability and traceability and, in some cases, transaction management.</t>
          <t indent="0" pn="section-4.4.3-5">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.4.3-6">
            <li pn="section-4.4.3-6.1">Defining edge computing abstractions, such as PaaS <xref target="Yangui" format="default" sectionFormat="of" derivedContent="Yangui"/>, suitable for users and cloud systems to interact with edge computing systems and dealing with interoperability issues, such as data-model heterogeneity.</li>
            <li pn="section-4.4.3-6.2">Enabling secure and resilient communication between IoT devices and a remote cloud, for example, through multipath support.</li>
          </ul>
        </section>
      </section>
      <section anchor="sec-components-app" numbered="true" removeInRFC="false" toc="include" pn="section-4.5">
        <name slugifiedName="name-application-components">Application Components</name>
        <t indent="0" pn="section-4.5-1">IoT edge computing can host applications, such as those mentioned in <xref target="sec-uc" format="default" sectionFormat="of" derivedContent="Section 2.4"/>. While describing the components of individual applications is out of our scope, some of those applications share similar functions, such as IoT device management and data management, as described below.</t>
        <section anchor="iot-device-management" numbered="true" removeInRFC="false" toc="include" pn="section-4.5.1">
          <name slugifiedName="name-iot-device-management">IoT Device Management</name>
          <t indent="0" pn="section-4.5.1-1">IoT device management includes managing information regarding IoT devices, including their sensors and how to communicate with them. Edge computing addresses the scalability challenges of a large number of IoT devices by separating the scalability domain into local (e.g., edge) networks and remote networks. For example, in the context of the oneM2M standard, a device management functionality (called "software campaign" in oneM2M) enables the installation, deletion, activation, and deactivation of software functions and services on a potentially large number of edge nodes <xref target="oneM2M-TR0052" format="default" sectionFormat="of" derivedContent="oneM2M-TR0052"/>. Using a dashboard or management software, a service provider issues these requests through an IoT cloud platform supporting the software campaign functionality.</t>
          <t indent="0" pn="section-4.5.1-2">The challenges listed in <xref target="sec-dis-auth" format="default" sectionFormat="of" derivedContent="Section 4.3.1"/> may be applicable to IoT device management as well.</t>
        </section>
        <section anchor="sec-data" numbered="true" removeInRFC="false" toc="include" pn="section-4.5.2">
          <name slugifiedName="name-data-management-and-analyti">Data Management and Analytics</name>
          <t indent="0" pn="section-4.5.2-1">Data storage and processing at the edge are major aspects of IoT edge computing, directly addressing the high-level IoT challenges listed in <xref target="sec-challenges" format="default" sectionFormat="of" derivedContent="Section 3"/>. Data analysis, for example, through AI/ML tasks performed at the edge, may benefit from specialized hardware support on the computing nodes.</t>
          <t indent="0" pn="section-4.5.2-2">Related challenges include:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.5.2-3">
            <li pn="section-4.5.2-3.1">Addressing concerns regarding resource usage, security, and privacy when sharing, processing, discovering, or managing data: for example, presenting data in views composed of an aggregation of related data <xref target="Zhang" format="default" sectionFormat="of" derivedContent="Zhang"/>, protecting data communication between authenticated peers <xref target="Basudan" format="default" sectionFormat="of" derivedContent="Basudan"/>, classifying data (e.g., in terms of privacy, importance, and validity), and compressing and encrypting data, for example, using homomorphic encryption to directly process encrypted data <xref target="Stanciu" format="default" sectionFormat="of" derivedContent="Stanciu"/>.</li>
            <li pn="section-4.5.2-3.2">Other concerns regarding edge data discovery (e.g., streaming data, metadata, and events) include siloization and lack of standards in edge environments that can be dynamic (e.g., vehicular networks) and heterogeneous <xref target="I-D.mcbride-edge-data-discovery-overview" format="default" sectionFormat="of" derivedContent="EDGE-DATA-DISCOVERY-OVERVIEW"/>.</li>
            <li pn="section-4.5.2-3.3">Data-driven programming models <xref target="Renart" format="default" sectionFormat="of" derivedContent="Renart"/>, for example, those that are event based, including handling naming and data abstractions.</li>
            <li pn="section-4.5.2-3.4">Data integration in an environment without data standardization or where different sources use different ontologies <xref target="Farnbauer-Schmidt" format="default" sectionFormat="of" derivedContent="Farnbauer-Schmidt"/>.</li>
            <li pn="section-4.5.2-3.5">Addressing concerns such as limited resources, privacy, and dynamic and heterogeneous environments to deploy machine learning at the edge: for example, making machine learning more lightweight and distributed (e.g., enabling distributed inference at the edge), supporting shorter training times and simplified models, and supporting models that can be compressed for efficient communication <xref target="Murshed" format="default" sectionFormat="of" derivedContent="Murshed"/>.</li>
            <li pn="section-4.5.2-3.6">Although edge computing can support IoT services independently of cloud computing, it can also be connected to cloud computing. Thus, the relationship between IoT edge computing and cloud computing, with regard to data management, is another potential challenge <xref target="ISO_TR" format="default" sectionFormat="of" derivedContent="ISO_TR"/>.</li>
          </ul>
        </section>
      </section>
      <section anchor="simulation-and-emulation-environments" numbered="true" removeInRFC="false" toc="include" pn="section-4.6">
        <name slugifiedName="name-simulation-and-emulation-en">Simulation and Emulation Environments</name>
        <t indent="0" pn="section-4.6-1">IoT edge computing introduces new challenges to the simulation and emulation tools used by researchers and developers. A varied set of applications, networks, and computing technologies can coexist in a distributed system, making modeling difficult. Scale, mobility, and resource management are additional challenges <xref target="SimulatingFog" format="default" sectionFormat="of" derivedContent="SimulatingFog"/>.</t>
        <t indent="0" pn="section-4.6-2">Tools include simulators, where simplified application logic runs on top of a fog network model, and emulators, where actual applications can be deployed, typically in software containers, over a cloud infrastructure (e.g., Docker and Kubernetes) running over a network emulating network edge conditions, such as variable delays, throughput,  and mobility events. To gain in scale, emulated and simulated systems can be used together in hybrid federation-based approaches <xref target="PseudoDynamicTesting" format="default" sectionFormat="of" derivedContent="PseudoDynamicTesting"/>; whereas to gain in realism, physical devices can be interconnected with emulated systems. Examples of related work and platforms include the publicly accessible MEC sandbox work recently initiated in ETSI <xref target="ETSI_Sandbox" format="default" sectionFormat="of" derivedContent="ETSI_Sandbox"/> and open-source simulators and emulators (<xref target="AdvantEDGE" format="default" sectionFormat="of" derivedContent="AdvantEDGE"/> emulator and tools cited in <xref target="SimulatingFog" format="default" sectionFormat="of" derivedContent="SimulatingFog"/>). EdgeNet <xref target="Senel" format="default" sectionFormat="of" derivedContent="Senel"/> is a globally distributed edge cloud for Internet researchers, which uses nodes contributed by institutions and which is based on Docker for containerization and Kubernetes for deployment and node management.</t>
        <t indent="0" pn="section-4.6-3">Digital twins are virtual instances of a physical system (twin) that are continually updated with the latter's performance, maintenance, and health status data throughout the life cycle of the physical system <xref target="Madni" format="default" sectionFormat="of" derivedContent="Madni"/>. In contrast to an emulation or simulated environment, digital twins, once generated, are maintained in sync by their physical twin, which can be, among many other instances, an IoT device, edge device, or an edge network. The benefits of digital twins go beyond those of emulation and include accelerated business processes, enhanced productivity, and faster innovation with reduced costs <xref target="I-D.irtf-nmrg-network-digital-twin-arch" format="default" sectionFormat="of" derivedContent="NETWORK-DIGITAL-TWIN-ARCH"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1">Privacy and security are drivers of the adoption of edge computing for the IoT (<xref target="sec-priv" format="default" sectionFormat="of" derivedContent="Section 3.4"/>). As discussed in <xref target="sec-dis-auth" format="default" sectionFormat="of" derivedContent="Section 4.3.1"/>, authentication and trust (among computing nodes, management nodes, and end devices) can be challenging as scale, mobility, and heterogeneity increase. The sometimes disconnected nature of edge resources can avoid reliance on third-party authorities. Distributed edge computing is exposed to reliability and denial-of-service attacks. A personal or proprietary IoT data leakage is also a major threat, particularly because of the distributed nature of the systems (<xref target="sec-data" format="default" sectionFormat="of" derivedContent="Section 4.5.2"/>). Furthermore, blockchain-based distributed IoT edge computing must be designed for privacy, since public blockchain addressing does not guarantee absolute anonymity <xref target="Ali" format="default" sectionFormat="of" derivedContent="Ali"/>.</t>
      <t indent="0" pn="section-5-2">However, edge computing also offers solutions in the security space: maintaining privacy by computing sensitive data closer to data generators is a major use case for IoT edge computing.  An edge cloud can be used to perform actions based on sensitive data or to anonymize or aggregate data prior to transmission to a remote cloud server. Edge computing communication brokering functions can also be used to secure communication between edge and cloud networks.</t>
    </section>
    <section anchor="conclusion" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-conclusion">Conclusion</name>
      <t indent="0" pn="section-6-1">IoT edge computing plays an essential role, complementary to the cloud, in enabling IoT systems in certain situations. In this document, we presented use cases and listed the core challenges faced by the IoT that drive the need for IoT edge computing.  Therefore, the first part of this document may help focus future research efforts on the aspects of IoT edge computing where it is most useful. The second part of this document presents a general system model and structured overview of the associated research challenges and related work. The structure, based on the system model, is not meant to be restrictive and exists for the purpose of having a link between individual research areas and where they are applicable in an IoT edge computing system.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.mcbride-edge-data-discovery-overview" to="EDGE-DATA-DISCOVERY-OVERVIEW"/>
    <displayreference target="I-D.irtf-t2trg-rest-iot" to="REST-IOT"/>
    <displayreference target="I-D.bernardos-sfc-fog-ran" to="SFC-FOG-RAN"/>
    <displayreference target="I-D.ietf-core-groupcomm-bis" to="CORE-GROUPCOMM-BIS"/>
    <displayreference target="I-D.sarathchandra-coin-appcentres" to="COIN-APPCENTRES"/>
    <displayreference target="I-D.defoy-t2trg-iot-edge-computing-background" to="EDGE-COMPUTING-BACKGROUND"/>
    <displayreference target="I-D.irtf-nmrg-network-digital-twin-arch" to="NETWORK-DIGITAL-TWIN-ARCH"/>
    <displayreference target="I-D.hsingh-coinrg-reqs-p4comp" to="REQS-P4COMP"/>
    <references pn="section-8">
      <name slugifiedName="name-informative-references">Informative References</name>
      <reference anchor="AdvantEDGE" target="https://github.com/InterDigitalInc/AdvantEDGE" quoteTitle="true" derivedAnchor="AdvantEDGE">
        <front>
          <title>AdvantEDGE, Mobile Edge Emulation Platform</title>
          <author>
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2023" month="May"/>
        </front>
        <refcontent>commit 8f6edbe</refcontent>
      </reference>
      <reference anchor="Ali" quoteTitle="true" target="https://doi.org/10.1109/IOTM.2019.1800024" derivedAnchor="Ali">
        <front>
          <title>Enabling a Blockchain-Based IoT Edge</title>
          <author initials="M." surname="Ali" fullname="Muhammad Salek Ali">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Vecchio" fullname="Massimo Vecchio">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Antonelli" fullname="Fabio Antonelli">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="December"/>
        </front>
        <refcontent>IEEE Internet of Things Magazine, vol. 1, no.2, pp. 24-29</refcontent>
        <seriesInfo name="DOI" value="10.1109/IOTM.2019.1800024"/>
      </reference>
      <reference anchor="Anglano" quoteTitle="true" target="https://doi.org/10.1109/fmec.2018.8364054" derivedAnchor="Anglano">
        <front>
          <title>A game-theoretic approach to coalition formation in fog provider federations</title>
          <author initials="C." surname="Anglano" fullname="Cosimo Anglano">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Canonico" fullname="Massimo Canonico">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Castagno" fullname="Paolo Castagno">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Guazzone" fullname="Marco Guazzone">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Sereno" fullname="Matteo Sereno">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="April"/>
        </front>
        <refcontent>2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/fmec.2018.8364054"/>
      </reference>
      <reference anchor="Argungu" quoteTitle="true" derivedAnchor="Argungu">
        <front>
          <title>A Survey of Edge Computing Approaches in Smart Factory</title>
          <author initials="J." surname="Argungu" fullname="Jamilu Ibrahim Argungu"/>
          <author initials="M." surname="Idina" fullname="Mustapha Malami Idina"/>
          <author initials="U." surname="Chalawa" fullname="Umar Aliyu Chalawa"/>
          <author initials="M." surname="Ummar" fullname="Musa Ummar"/>
          <author initials="S." surname="Bello" fullname="Sadiq Buhari Bello"/>
          <author initials="I." surname="Arzika" fullname="Ibrahim Arzika"/>
          <author initials="B." surname="Mala" fullname="Baba Mala"/>
          <date year="2023" month="September"/>
        </front>
        <refcontent>International Journal of Advanced
        Research in Computer and Communication Engineering, Vol. 12, Issue 9</refcontent>
      </reference>
      <reference anchor="Ashton" target="http://www.itrco.jp/libraries/RFIDjournal-That%20Internet%20of%20Things%20Thing.pdf" quoteTitle="true" derivedAnchor="Ashton">
        <front>
          <title>That 'Internet of Things' Thing</title>
          <author initials="K." surname="Ashton" fullname="Kevin Ashton">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2009" month="June"/>
        </front>
        <refcontent>RFID Journal, vol. 22, no. 7, pp. 97-114</refcontent>
      </reference>
      <reference anchor="Badjie" target="https://medium.com/@bakarykumba1996/the-future-of-autonomous-driving-systems-with-edge-computing-8c919597c4ee" quoteTitle="true" derivedAnchor="Badjie">
        <front>
          <title>The Future of Autonomous Driving Systems with Edge Computing</title>
          <author initials="B." surname="Badjie" fullname="Bakary Badjie"/>
          <date month="September" year="2023"/>
        </front>
      </reference>
      <reference anchor="Basudan" quoteTitle="true" target="https://doi.org/10.1109/jiot.2017.2666783" derivedAnchor="Basudan">
        <front>
          <title>A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing</title>
          <author initials="S." surname="Basudan" fullname="Sultan Basudan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="X." surname="Lin" fullname="Xiaodong Lin">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Sankaranarayanan" fullname="Karthik Sankaranarayanan">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <refcontent>IEEE Internet of Things Journal, vol. 4, no. 3, pp. 772-782</refcontent>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2666783"/>
      </reference>
      <reference anchor="BigRentz" target="https://www.bigrentz.com/blog/construction-safety-statistics" quoteTitle="true" derivedAnchor="BigRentz">
        <front>
          <title>41 Construction Safety Statistics for 2024</title>
          <author>
            <organization showOnFrontPage="true">BigRentz</organization>
          </author>
          <date month="February" year="2024"/>
        </front>
      </reference>
      <reference anchor="Botta" quoteTitle="true" target="https://doi.org/10.1016/j.future.2015.09.021" derivedAnchor="Botta">
        <front>
          <title>Integration of Cloud computing and Internet of Things: A survey</title>
          <author initials="A." surname="Botta" fullname="Alessio Botta">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="de Donato" fullname="Walter de Donato">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="V." surname="Persico" fullname="Valerio Persico">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Pescapé" fullname="Antonio Pescapé">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="March"/>
        </front>
        <refcontent>Future Generation Computer Systems, vol. 56, pp. 684-700</refcontent>
        <seriesInfo name="DOI" value="10.1016/j.future.2015.09.021"/>
      </reference>
      <reference anchor="Brecko" quoteTitle="true" target="https://doi.org/10.3390/app12189124" derivedAnchor="Brecko">
        <front>
          <title>Federated Learning for Edge Computing: A Survey</title>
          <author initials="A." surname="Brecko" fullname="Alexander Brecko">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="E." surname="Kajáti" fullname="Erik Kajáti">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Koziorek" fullname="Jiri Koziorek">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="I." surname="Zolotová" fullname="Iveta Zolotová">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2022" month="September"/>
        </front>
        <refcontent>Applied Sciences 12(18):9124</refcontent>
        <seriesInfo name="DOI" value="10.3390/app12189124"/>
      </reference>
      <reference anchor="Cao" quoteTitle="true" target="https://doi.org/10.1145/3434770.3459741" derivedAnchor="Cao">
        <front>
          <title>eCaaS: A Management Framework of Edge Container as a Service for Business Workload</title>
          <author initials="L." surname="Cao" fullname="Lianjie Cao">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Merican" fullname="Anu Merican">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Tootaghaj" fullname="Diman Zad Tootaghaj">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Ahmed" fullname="Faraz Ahmed">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Sharma" fullname="Puneet Sharma">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="V." surname="Saxena" fullname="Vinay Saxena">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <refcontent>Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3434770.3459741"/>
      </reference>
      <reference anchor="CertMagic" target="https://certmagic.medium.com/digital-twin-technology-simulating-real-world-scenarios-for-enhanced-decision-making-8844c51e856d" quoteTitle="true" derivedAnchor="CertMagic">
        <front>
          <title>Digital Twin Technology: Simulating Real-World Scenarios for Enhanced Decision Making</title>
          <author>
            <organization showOnFrontPage="true">CertMagic</organization>
          </author>
          <date month="May" year="2023"/>
        </front>
      </reference>
      <reference anchor="Chen" quoteTitle="true" target="https://doi.org/10.1109/mcom.2018.1701231" derivedAnchor="Chen">
        <front>
          <title>Edge Computing in IoT-Based Manufacturing</title>
          <author initials="B." surname="Chen" fullname="Baotong Chen">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Wan" fullname="Jiafu Wan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Celesti" fullname="Antonio Celesti">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Li" fullname="Di Li">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="H." surname="Abbas" fullname="Haider Abbas">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qin Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="September"/>
        </front>
        <refcontent>IEEE Communications Magazine, vol. 56, no. 9, pp. 103-109</refcontent>
        <seriesInfo name="DOI" value="10.1109/mcom.2018.1701231"/>
      </reference>
      <reference anchor="Chiang" quoteTitle="true" target="https://doi.org/10.1109/jiot.2016.2584538" derivedAnchor="Chiang">
        <front>
          <title>Fog and IoT: An Overview of Research Opportunities</title>
          <author initials="M." surname="Chiang" fullname="Mung Chiang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Zhang" fullname="Tao Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="December"/>
        </front>
        <refcontent>IEEE Internet of Things Journal, vol. 3, no. 6, pp. 854-864</refcontent>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2584538"/>
      </reference>
      <reference anchor="Chipmunk" quoteTitle="true" target="https://doi.org/10.1145/3405656.3420231" derivedAnchor="Chipmunk">
        <front>
          <title>Chipmunk: Distributed Object Storage for NDN</title>
          <author fullname="Yong Yoon Shin" initials="Y." surname="Shin">
            <organization showOnFrontPage="true">ETRI, GurumNetworks, Republic of Korea</organization>
          </author>
          <author fullname="Sae Hyong Park" initials="S." surname="Park">
            <organization showOnFrontPage="true">ETRI, GurumNetworks, Republic of Korea</organization>
          </author>
          <author fullname="Namseok Ko" initials="N." surname="Ko">
            <organization showOnFrontPage="true">ETRI, GurumNetworks, Republic of Korea</organization>
          </author>
          <author fullname="Arm Jeong" initials="A." surname="Jeong">
            <organization showOnFrontPage="true">ETRI, GurumNetworks, Republic of Korea</organization>
          </author>
          <date month="September" year="2020"/>
        </front>
        <refcontent>Proceedings of the 7th ACM Conference on Information-Centric Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3405656.3420231"/>
        <refcontent>ACM</refcontent>
      </reference>
      <reference anchor="Cloudlets" quoteTitle="true" target="https://doi.org/10.1109/mprv.2009.82" derivedAnchor="Cloudlets">
        <front>
          <title>The Case for VM-Based Cloudlets in Mobile Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="Mahadev Satyanarayanan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Bahl" fullname="Paramvir Bahl">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Caceres" fullname="Ramon Caceres">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Davies" fullname="Nigel Davies">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2009" month="October"/>
        </front>
        <refcontent>IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23</refcontent>
        <seriesInfo name="DOI" value="10.1109/mprv.2009.82"/>
      </reference>
      <reference anchor="I-D.sarathchandra-coin-appcentres" target="https://datatracker.ietf.org/doc/html/draft-sarathchandra-coin-appcentres-04" quoteTitle="true" derivedAnchor="COIN-APPCENTRES">
        <front>
          <title>In-Network Computing for App-Centric Micro-Services</title>
          <author initials="D." surname="Trossen" fullname="Dirk Trossen">
            <organization showOnFrontPage="true">Huawei</organization>
          </author>
          <author initials="C." surname="Sarathchandra" fullname="Chathura Sarathchandra">
            <organization showOnFrontPage="true">InterDigital Inc.</organization>
          </author>
          <author initials="M." surname="Boniface" fullname="Michael Boniface">
            <organization showOnFrontPage="true">University of Southampton</organization>
          </author>
          <date month="January" day="26" year="2021"/>
          <abstract>
            <t indent="0">   The application-centric deployment of 'Internet' services has
   increased over the past ten years with many millions of applications
   providing user-centric services, executed on increasingly more
   powerful smartphones that are supported by Internet-based cloud
   services in distributed data centres, the latter mainly provided by
   large scale players such as Google, Amazon and alike. This draft
   outlines a vision for evolving those data centres towards executing
   app-centric micro-services; we dub this evolved data centre as an
   AppCentre. Complemented with the proliferation of such AppCentres at
   the edge of the network, they will allow for such micro-services to
   be distributed across many places of execution, including mobile
   terminals themselves, while specific micro-service chains equal
   today's applications in existing smartphones.

   We outline the key enabling technologies that needs to be provided
   for such evolution to be realized, including references to ongoing
   standardization efforts in key areas.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-sarathchandra-coin-appcentres-04"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="I-D.ietf-core-groupcomm-bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-groupcomm-bis-10" quoteTitle="true" derivedAnchor="CORE-GROUPCOMM-BIS">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <author initials="E." surname="Dijk" fullname="Esko Dijk">
            <organization showOnFrontPage="true">IoTconsultancy.nl</organization>
          </author>
          <author initials="C." surname="Wang" fullname="Chonggang Wang">
            <organization showOnFrontPage="true">InterDigital</organization>
          </author>
          <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
            <organization showOnFrontPage="true">RISE AB</organization>
          </author>
          <date month="October" day="23" year="2023"/>
          <abstract>
            <t indent="0">   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces and obsoletes RFC 7390, while it updates RFC 7252
   and RFC 7641.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-10"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="Echeverria" quoteTitle="true" target="https://doi.org/10.1109/sec.2016.27" derivedAnchor="Echeverria">
        <front>
          <title>Establishing Trusted Identities in Disconnected Edge Environments</title>
          <author initials="S." surname="Echeverría" fullname="Sebastián Echeverría">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Klinedinst" fullname="Dan Klinedinst">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Williams" fullname="Keegan Williams">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="G." surname="Lewis" fullname="Grace A. Lewis">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <refcontent>2016 IEEE/ACM Symposium on Edge Computing (SEC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/sec.2016.27"/>
      </reference>
      <reference anchor="I-D.defoy-t2trg-iot-edge-computing-background" target="https://datatracker.ietf.org/doc/html/draft-defoy-t2trg-iot-edge-computing-background-00" quoteTitle="true" derivedAnchor="EDGE-COMPUTING-BACKGROUND">
        <front>
          <title>IoT Edge Computing: Initiatives, Projects and Products</title>
          <author initials="X." surname="de Foy" fullname="Xavier de Foy">
            <organization showOnFrontPage="true">InterDigital Communications</organization>
          </author>
          <author initials="J." surname="Hong" fullname="Jungha Hong">
            <organization showOnFrontPage="true">ETRI</organization>
          </author>
          <author initials="Y." surname="Hong" fullname="Yong-Geun Hong">
            <organization showOnFrontPage="true">ETRI</organization>
          </author>
          <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
            <organization showOnFrontPage="true">Huawei Technologies Duesseldorf GmbH</organization>
          </author>
          <author initials="E." surname="Schooler" fullname="Eve Schooler">
            <organization showOnFrontPage="true">Intel</organization>
          </author>
          <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
            <organization showOnFrontPage="true">University of Applied Sciences Emden/Leer</organization>
          </author>
          <date month="May" day="25" year="2020"/>
          <abstract>
            <t indent="0">   Many IoT applications have requirements that cannot be met by
   the traditional Cloud.  As a result, the IoT is driving the Internet
   toward Edge computing.  This draft reviews initiatives, projects and
   products related to IoT Edge Computing.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-defoy-t2trg-iot-edge-computing-background-00"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="I-D.mcbride-edge-data-discovery-overview" target="https://datatracker.ietf.org/doc/html/draft-mcbride-edge-data-discovery-overview-05" quoteTitle="true" derivedAnchor="EDGE-DATA-DISCOVERY-OVERVIEW">
        <front>
          <title>Edge Data Discovery for COIN</title>
          <author initials="M." surname="McBride" fullname="Mike McBride">
            <organization showOnFrontPage="true">Futurewei</organization>
          </author>
          <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
            <organization showOnFrontPage="true">Emden University</organization>
          </author>
          <author initials="E." surname="Schooler" fullname="Eve Schooler">
            <organization showOnFrontPage="true">Intel</organization>
          </author>
          <author initials="C. J." surname="Bernardos" fullname="Carlos J. Bernardos">
            <organization showOnFrontPage="true">Universidad Carlos III de Madrid</organization>
          </author>
          <author initials="D." surname="Lopez" fullname="Diego Lopez">
            <organization showOnFrontPage="true">Telefonica</organization>
          </author>
          <author initials="X." surname="de Foy" fullname="Xavier de Foy">
            <organization showOnFrontPage="true">InterDigital Communications, LLC</organization>
          </author>
          <date month="November" day="1" year="2020"/>
          <abstract>
            <t indent="0">   This document describes the problem of distributed data discovery in
   edge computing, and in particular for computing-in-the-network
   (COIN), which may require both the marshalling of data at the outset
   of a computation and the persistence of the resultant data after the
   computation.  Although the data might originate at the network edge,
   as more and more distributed data is created, processed, and stored,
   it becomes increasingly dispersed throughout the network.  There
   needs to be a standard way to find it.  New and existing protocols
   will need to be developed to support distributed data discovery at
   the network edge and beyond.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-mcbride-edge-data-discovery-overview-05"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="ENERGY" quoteTitle="true" target="https://doi.org/10.1016/j.energy.2014.10.025" derivedAnchor="ENERGY">
        <front>
          <title>Revealing household characteristics from smart meter data</title>
          <author initials="C." surname="Beckel" fullname="Christian Beckel">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="L." surname="Sadamori" fullname="Leyna Sadamori">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Staake" fullname="Thorsten Staake">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Santini" fullname="Silvia Santini">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2014" month="December"/>
        </front>
        <refcontent>Energy, vol. 78, pp. 397-410</refcontent>
        <seriesInfo name="DOI" value="10.1016/j.energy.2014.10.025"/>
      </reference>
      <reference anchor="ETSI_MEC_01" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf" quoteTitle="true" derivedAnchor="ETSI_MEC_01">
        <front>
          <title>Multi-access Edge Computing (MEC); Terminology</title>
          <author>
            <organization showOnFrontPage="true">ETSI</organization>
          </author>
          <date year="2019" month="January"/>
        </front>
        <seriesInfo name="ETSI GS" value="MEC 001"/>
        <refcontent>V2.1.1</refcontent>
      </reference>
      <reference anchor="ETSI_MEC_03" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf" quoteTitle="true" derivedAnchor="ETSI_MEC_03">
        <front>
          <title>Multi-access Edge Computing (MEC); Framework and Reference Architecture</title>
          <author>
            <organization showOnFrontPage="true">ETSI</organization>
          </author>
          <date year="2019" month="January"/>
        </front>
        <seriesInfo name="ETSI GS" value="MEC 003"/>
        <refcontent>V2.1.1</refcontent>
      </reference>
      <reference anchor="ETSI_MEC_33" target="https://www.etsi.org/deliver/etsi_gs/MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf" quoteTitle="true" derivedAnchor="ETSI_MEC_33">
        <front>
          <title>Multi-access Edge Computing (MEC); IoT API</title>
          <author>
            <organization showOnFrontPage="true">ETSI</organization>
          </author>
          <date year="2022" month="December"/>
        </front>
        <seriesInfo name="ETSI GS" value="MEC 033"/>
        <refcontent>V3.1.1</refcontent>
      </reference>
      <reference anchor="ETSI_Sandbox" target="https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=57671" quoteTitle="true" derivedAnchor="ETSI_Sandbox">
        <front>
          <title>Multi-access Edge Computing (MEC) MEC Sandbox</title>
          <author>
            <organization showOnFrontPage="true">ETSI</organization>
          </author>
          <date year="2023" month="September"/>
        </front>
        <refcontent>Portal</refcontent>
      </reference>
      <reference anchor="Fan" quoteTitle="true" target="https://doi.org/10.1109/icc.2017.7996722" derivedAnchor="Fan">
        <front>
          <title>Cost Aware cloudlet Placement for big data processing at the edge</title>
          <author initials="Q." surname="Fan" fullname="Qiang Fan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Ansari" fullname="Nirwan Ansari">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <refcontent>2017 IEEE International Conference on Communications (ICC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/icc.2017.7996722"/>
      </reference>
      <reference anchor="Farnbauer-Schmidt" quoteTitle="true" target="https://doi.org/10.18420/inf2019_19" derivedAnchor="Farnbauer-Schmidt">
        <front>
          <title>Combining the Concepts of Semantic Data Integration and Edge Computing</title>
          <author initials="M." surname="Farnbauer-Schmidt" fullname="Matthias Farnbauer-Schmidt">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Lindner" fullname="Julian Lindner">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Kaffenberger" fullname="Christopher Kaffenberger">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Albrecht" fullname="Jens Albrecht">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="September"/>
        </front>
        <refcontent>INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaf, pp. 139-152</refcontent>
        <seriesInfo name="DOI" value="10.18420/inf2019_19"/>
      </reference>
      <reference anchor="Grewe" quoteTitle="true" target="https://doi.org/10.1145/3098208.3098210" derivedAnchor="Grewe">
        <front>
          <title>Information-Centric Mobile Edge Computing for Connected Vehicle Environments: Challenges and Research Directions</title>
          <author initials="D." surname="Grewe" fullname="Dennis Grewe">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Wagner" fullname="Marco Wagner">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Arumaithurai" fullname="Mayutan Arumaithurai">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="I." surname="Psaras" fullname="Ioannis Psaras">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="August"/>
        </front>
        <refcontent>Proceedings of the Workshop on Mobile Edge Communications, pp. 7-12</refcontent>
        <seriesInfo name="DOI" value="10.1145/3098208.3098210"/>
      </reference>
      <reference anchor="Harchol" quoteTitle="true" target="https://doi.org/10.1145/3229556.3229558" derivedAnchor="Harchol">
        <front>
          <title>CESSNA: Resilient Edge-Computing</title>
          <author initials="Y." surname="Harchol" fullname="Yotam Harchol">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Mushtaq" fullname="Aisha Mushtaq">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="McCauley" fullname="James McCauley">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Panda" fullname="Aurojit Panda">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Shenker" fullname="Scott Shenker">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="August"/>
        </front>
        <refcontent>Proceedings of the 2018 Workshop on Mobile Edge Communications</refcontent>
        <seriesInfo name="DOI" value="10.1145/3229556.3229558"/>
      </reference>
      <reference anchor="IEC_IEEE_60802" target="https://grouper.ieee.org/groups/802/1/files/public/docs2018/60802-industrial-use-cases-0918-v13.pdf" quoteTitle="true" derivedAnchor="IEC_IEEE_60802">
        <front>
          <title>Use Cases IEC/IEEE 60802</title>
          <author>
            <organization showOnFrontPage="true">IEC/IEEE</organization>
          </author>
          <date year="2018" month="September"/>
        </front>
        <seriesInfo name="IEC/IEEE" value="60802"/>
        <refcontent>V1.3</refcontent>
      </reference>
      <reference anchor="ISO_TR" target="https://www.iso.org/standard/53284.html" quoteTitle="true" derivedAnchor="ISO_TR">
        <front>
          <title>Internet of things (IoT) - Edge computing</title>
          <author>
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="April"/>
        </front>
        <seriesInfo name="ISO/IEC" value="TR 30164:2020"/>
      </reference>
      <reference anchor="Jeffery" quoteTitle="true" target="https://doi.org/10.1145/3434770.3459730" derivedAnchor="Jeffery">
        <front>
          <title>Rearchitecting Kubernetes for the Edge</title>
          <author initials="A." surname="Jeffery" fullname="Andrew Jeffery">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="H." surname="Howard" fullname="Heidi Howard">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Mortier" fullname="Richard Mortier">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <refcontent>Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3434770.3459730"/>
      </reference>
      <reference anchor="Jeong" quoteTitle="true" target="https://doi.org/10.1109/fwc.2017.8368528" derivedAnchor="Jeong">
        <front>
          <title>Towards a distributed computing framework for Fog</title>
          <author initials="T." surname="Jeong" fullname="Taeyeol Jeong">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Chung" fullname="Jaeyoon Chung">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Hong" fullname="James Won-Ki Hong">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Ha" fullname="Sangtae Ha">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <refcontent>2017 IEEE Fog World Congress (FWC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/fwc.2017.8368528"/>
      </reference>
      <reference anchor="Jones" quoteTitle="true" target="https://doi.org/10.1016/j.cirpj.2020.02.002" derivedAnchor="Jones">
        <front>
          <title>Characterising the Digital Twin: A systematic literature review</title>
          <author initials="D." surname="Jones" fullname="David Jones">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Snider" fullname="Chris Snider">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Nassehi" fullname="Aydin Nassehi">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Yon" fullname="Jason Yon">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Hicks" fullname="Ben Hicks">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="May"/>
        </front>
        <refcontent>CIRP Journal of Manufacturing Science and Technology, vol. 29, pp. 36-52</refcontent>
        <seriesInfo name="DOI" value="10.1016/j.cirpj.2020.02.002"/>
      </reference>
      <reference anchor="Kelly" target="https://campustechnology.com/articles/2015/04/15/internet-of-things-data-to-top-1-6-zettabytes-by-2020.aspx" quoteTitle="true" derivedAnchor="Kelly">
        <front>
          <title>Internet of Things Data to Top 1.6 Zettabytes by 2020</title>
          <author initials="R." surname="Kelly" fullname="Rhea Kelly">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2015" month="April"/>
        </front>
        <annotation>Retrieved on 2022-05-24.</annotation>
      </reference>
      <reference anchor="Khan" quoteTitle="true" target="https://doi.org/10.1109/jiot.2020.2987070" derivedAnchor="Khan">
        <front>
          <title>Edge-Computing-Enabled Smart Cities: A Comprehensive Survey</title>
          <author initials="L." surname="Khan" fullname="Latif U. Khan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="I." surname="Yaqoob" fullname="Ibrar Yaqoob">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Tran" fullname="Nguyen H. Tran">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Kazmi" fullname="S. M. Ahsan Kazmi">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Dang" fullname="Tri Nguyen Dang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Hong" fullname="Choong Seon Hong">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="October"/>
        </front>
        <refcontent>IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10200-10232</refcontent>
        <seriesInfo name="DOI" value="10.1109/jiot.2020.2987070"/>
      </reference>
      <reference anchor="Kua" quoteTitle="true" target="https://doi.org/10.1145/3517212.3558083" derivedAnchor="Kua">
        <front>
          <title>Kua: a distributed object store over named data networking</title>
          <author fullname="Varun Patil" initials="V." surname="Patil">
            <organization showOnFrontPage="true">UCLA</organization>
          </author>
          <author fullname="Hemil Desai" initials="H." surname="Desai">
            <organization showOnFrontPage="true">UCLA</organization>
          </author>
          <author fullname="Lixia Zhang" initials="L." surname="Zhang">
            <organization showOnFrontPage="true">UCLA</organization>
          </author>
          <date month="September" year="2022"/>
        </front>
        <refcontent>Proceedings of the 9th ACM Conference on Information-Centric Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3517212.3558083"/>
      </reference>
      <reference anchor="Larrea" quoteTitle="true" target="https://doi.org/10.1145/3378679.3394537" derivedAnchor="Larrea">
        <front>
          <title>The serverkernel operating system</title>
          <author initials="J." surname="Larrea" fullname="Jon Larrea">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Barbalace" fullname="Antonio Barbalace">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="May"/>
        </front>
        <refcontent>Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3378679.3394537"/>
      </reference>
      <reference anchor="LFEDGE-EVE" target="https://www.lfedge.org/projects/eve" quoteTitle="true" derivedAnchor="LFEDGE-EVE">
        <front>
          <title>Project Edge Virtualization Engine (EVE)</title>
          <author>
            <organization showOnFrontPage="true">Linux Foundation</organization>
          </author>
        </front>
        <refcontent>Portal</refcontent>
        <annotation>Retrieved on 2022-05-24.</annotation>
      </reference>
      <reference anchor="Li" quoteTitle="true" target="https://doi.org/10.1109/icdcs.2017.54" derivedAnchor="Li">
        <front>
          <title>MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization</title>
          <author initials="Y." surname="Li" fullname="Yongbo Li">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Y." surname="Chen" fullname="Yurong Chen">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Lan" fullname="Tian Lan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="G." surname="Venkataramani" fullname="Guru Venkataramani">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="June"/>
        </front>
        <refcontent>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</refcontent>
        <seriesInfo name="DOI" value="10.1109/icdcs.2017.54"/>
      </reference>
      <reference anchor="Lin" quoteTitle="true" target="https://doi.org/10.1109/jiot.2017.2683200" derivedAnchor="Lin">
        <front>
          <title>A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications</title>
          <author initials="J." surname="Lin" fullname="Jie Lin">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="Yu" fullname="Wei Yu">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Zhang" fullname="Nan Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="X." surname="Yang" fullname="Xinyu Yang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="H." surname="Zhang" fullname="Hanlin Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="Zhao" fullname="Wei Zhao">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <refcontent>IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142</refcontent>
        <seriesInfo name="DOI" value="10.1109/jiot.2017.2683200"/>
      </reference>
      <reference anchor="Liu" quoteTitle="true" target="https://doi.org/10.1109/twc.2017.2737015" derivedAnchor="Liu">
        <front>
          <title>Cache Placement in Fog-RANs: From Centralized to Distributed Algorithms</title>
          <author initials="J." surname="Liu" fullname="Juan Liu">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Bai" fullname="Bo Bai">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Zhang" fullname="Jun Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Letaief" fullname="Khaled B. Letaief">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <refcontent>IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7039-7051</refcontent>
        <seriesInfo name="DOI" value="10.1109/twc.2017.2737015"/>
      </reference>
      <reference anchor="Madni" quoteTitle="true" target="https://doi.org/10.3390/systems7010007" derivedAnchor="Madni">
        <front>
          <title>Leveraging Digital Twin Technology in Model-Based Systems Engineering</title>
          <author initials="A." surname="Madni" fullname="Azad M. Madni">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Madni" fullname="Carla C. Madni">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Lucero" fullname="Scott D. Lucero">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="January"/>
        </front>
        <refcontent>Systems 7(1):7</refcontent>
        <seriesInfo name="DOI" value="10.3390/systems7010007"/>
      </reference>
      <reference anchor="Mahadev" quoteTitle="true" target="https://doi.org/10.1109/mc.2017.9" derivedAnchor="Mahadev">
        <front>
          <title>The Emergence of Edge Computing</title>
          <author initials="M." surname="Satyanarayanan" fullname="Mahadev Satyanarayanan">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="January"/>
        </front>
        <refcontent>Computer, vol. 50, no. 1, pp. 30-39</refcontent>
        <seriesInfo name="DOI" value="10.1109/mc.2017.9"/>
      </reference>
      <reference anchor="Mehmood" quoteTitle="true" target="https://doi.org/10.1155/2021/5524025" derivedAnchor="Mehmood">
        <front>
          <title>Edge Computing for IoT-Enabled Smart Grid</title>
          <author initials="M." surname="Mehmood" fullname="M. Yasir Mehmood"/>
          <author initials="A." surname="Oad" fullname="Ammar Oad"/>
          <author initials="M." surname="Abrar" fullname="Muhammad Abrar"/>
          <author initials="H." surname="Munir" fullname="Hafiz Mudassir Munir"/>
          <author initials="S." surname="Hasan" fullname="Syed Faraz Hasan"/>
          <author initials="H." surname="Muqeet" fullname="H. Abd ul Muqeet"/>
          <author initials="N." surname="Golilarz" fullname="Noorbakhsh Amiri Golilarz"/>
          <date year="2021" month="July"/>
        </front>
        <refcontent>Security and Communication Networks, Vol. 2021,
        Article ID 5524025</refcontent>
        <seriesInfo name="DOI" value="10.1155/2021/5524025"/>
      </reference>
      <reference anchor="Mortazavi" target="https://www.usenix.org/conference/hotedge18/presentation/mortazavi" quoteTitle="true" derivedAnchor="Mortazavi">
        <front>
          <title>Toward Session Consistency for the Edge</title>
          <author initials="S." surname="Mortazavi" fullname="Seyed Hossein Mortazavi">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Balasubramanian" fullname="Bharath Balasubramanian">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="E." surname="de Lara" fullname="Eyal de Lara">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Narayanan" fullname="Shankaranarayanan Puzhavakath Narayanan">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018"/>
        </front>
        <refcontent>USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18)</refcontent>
      </reference>
      <reference anchor="MQTT5" target="https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html" quoteTitle="true" derivedAnchor="MQTT5">
        <front>
          <title>MQTT Version 5.0</title>
          <author initials="A." surname="Banks" fullname="Andrew Banks" role="editor"/>
          <author initials="E." surname="Briggs" fullname="Ed Briggs" role="editor"/>
          <author initials="K." surname="Borgendale" fullname="Ken Borgendale" role="editor"/>
          <author initials="R." surname="Gupta" fullname="Rahul Gupta" role="editor"/>
          <date year="2019" month="March"/>
        </front>
        <refcontent>OASIS Standard</refcontent>
      </reference>
      <reference anchor="Murshed" quoteTitle="true" target="https://doi.org/10.1145/3469029" derivedAnchor="Murshed">
        <front>
          <title>Machine Learning at the Network Edge: A Survey</title>
          <author initials="M." surname="Murshed" fullname="M. G. Sarwar Murshed">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Murphy" fullname="Christopher Murphy">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Hou" fullname="Daqing Hou">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Khan" fullname="Nazar Khan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="G." surname="Ananthanarayanan" fullname="Ganesh Ananthanarayanan">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Hussain" fullname="Faraz Hussain">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="October"/>
        </front>
        <refcontent>ACM Computing Surveys, vol. 54, no. 8, pp. 1-37</refcontent>
        <seriesInfo name="DOI" value="10.1145/3469029"/>
      </reference>
      <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch" target="https://datatracker.ietf.org/doc/html/draft-irtf-nmrg-network-digital-twin-arch-05" quoteTitle="true" derivedAnchor="NETWORK-DIGITAL-TWIN-ARCH">
        <front>
          <title>Network Digital Twin: Concepts and Reference Architecture</title>
          <author initials="C." surname="Zhou" fullname="Cheng Zhou">
            <organization showOnFrontPage="true">China Mobile</organization>
          </author>
          <author initials="H." surname="Yang" fullname="Hongwei Yang">
            <organization showOnFrontPage="true">China Mobile</organization>
          </author>
          <author initials="X." surname="Duan" fullname="Xiaodong Duan">
            <organization showOnFrontPage="true">China Mobile</organization>
          </author>
          <author initials="D." surname="Lopez" fullname="Diego Lopez">
         </author>
          <author initials="A." surname="Pastor" fullname="Antonio Pastor">
         </author>
          <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization showOnFrontPage="true">Huawei</organization>
          </author>
          <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
            <organization showOnFrontPage="true">Orange</organization>
          </author>
          <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
            <organization showOnFrontPage="true">Orange</organization>
          </author>
          <date month="March" day="4" year="2024"/>
          <abstract>
            <t indent="0">   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications and realize efficient and cost effective data driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses the benefits and
   key challenges of such technology.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-05"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="Nieke" quoteTitle="true" target="https://doi.org/10.1145/3434770.3459731" derivedAnchor="Nieke">
        <front>
          <title>Edgedancer: Secure Mobile WebAssembly Services on the Edge</title>
          <author initials="M." surname="Nieke" fullname="Manuel Nieke">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="L." surname="Almstedt" fullname="Lennart Almstedt">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Kapitza" fullname="Rudiger Kapitza">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <refcontent>Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3434770.3459731"/>
      </reference>
      <reference anchor="NIST" quoteTitle="true" target="https://doi.org/10.6028/nist.sp.800-145" derivedAnchor="NIST">
        <front>
          <title>The NIST Definition of Cloud Computing</title>
          <author initials="P." surname="Mell" fullname="Peter Mell">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Grance" fullname="Timothy Grance">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2011" month="September"/>
        </front>
        <seriesInfo name="NIST Special Publication" value="800-145"/>
        <seriesInfo name="DOI" value="10.6028/nist.sp.800-145"/>
      </reference>
      <reference anchor="NVIDIA" target="https://devblogs.nvidia.com/training-self-driving-vehicles-challenge-scale/" quoteTitle="true" derivedAnchor="NVIDIA">
        <front>
          <title>Training AI for Self-Driving Vehicles: the Challenge of Scale</title>
          <author initials="A." surname="Grzywaczewski" fullname="Adam Grzywaczewski">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="October"/>
        </front>
        <refcontent>NVIDIA Developer Blog</refcontent>
        <annotation>Retrieved on 2022-05-24.</annotation>
      </reference>
      <reference anchor="OGrady" quoteTitle="true" target="https://doi.org/10.1016/j.aiia.2019.12.001" derivedAnchor="OGrady">
        <front>
          <title>Edge computing: A tractable model for smart agriculture?</title>
          <author initials="M." surname="O'Grady" fullname="M.J. O'Grady"/>
          <author initials="D." surname="Langton" fullname="D. Langton"/>
          <author initials="G." surname="O'Hare" fullname="G.M.P. O'Hare"/>
          <date month="September" year="2019"/>
        </front>
        <refcontent>Artificial Intelligence in Agriculture, Vol. 3, Pages 42-51</refcontent>
        <seriesInfo name="DOI" value="10.1016/j.aiia.2019.12.001"/>
      </reference>
      <reference anchor="oneM2M-TR0001" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=28153" quoteTitle="true" derivedAnchor="oneM2M-TR0001">
        <front>
          <title>Use Cases Collection</title>
          <author initials="C." surname="Mladin" fullname="Catalina Mladin">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="October"/>
        </front>
        <seriesInfo name="TR" value="0001"/>
        <refcontent>oneM2M, v4.2.0</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0018" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29334" quoteTitle="true" derivedAnchor="oneM2M-TR0018">
        <front>
          <title>Industrial Domain Enablement</title>
          <author initials="C." surname="Lu" fullname="Chengsui Lu">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Jiang" fullname="Miao Jiang">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <seriesInfo name="TR" value="0018"/>
        <refcontent>oneM2M, v2.5.2</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0026" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=31410" quoteTitle="true" derivedAnchor="oneM2M-TR0026">
        <front>
          <title>Vehicular Domain Enablement</title>
          <author initials="K." surname="Yamamoto" fullname="Kenichi Yamamoto">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Mladin" fullname="Catalina Mladin">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="V." surname="Kueh" fullname="Victor Kueh">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="January"/>
        </front>
        <seriesInfo name="TR" value="0026"/>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TR0052" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=32633" quoteTitle="true" derivedAnchor="oneM2M-TR0052">
        <front>
          <title>Study on Edge and Fog Computing in oneM2M systems</title>
          <author initials="K." surname="Yamamoto" fullname="Kenichi Yamamoto">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Mladin" fullname="Catalina Mladin">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2020" month="September"/>
        </front>
        <seriesInfo name="TR" value="0052"/>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="oneM2M-TS0002" target="https://member.onem2m.org/Application/documentapp/downloadLatestRevision/default.aspx?docID=29274" quoteTitle="true" derivedAnchor="oneM2M-TS0002">
        <front>
          <title>TS 0002, Requirements</title>
          <author initials="S." surname="He" fullname="Shane He">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <seriesInfo name="TS" value="0002"/>
        <refcontent>oneM2M</refcontent>
      </reference>
      <reference anchor="OpenFog" target="https://iiconsortium.org/pdf/OpenFog_Reference_Architecture_2_09_17.pdf" quoteTitle="true" derivedAnchor="OpenFog">
        <front>
          <title>OpenFog Reference Architecture for Fog Computing</title>
          <author>
            <organization showOnFrontPage="true">OpenFog Consortium</organization>
          </author>
          <date year="2017" month="February"/>
        </front>
      </reference>
      <reference anchor="PseudoDynamicTesting" quoteTitle="true" target="https://doi.org/10.1109/mcom.2017.1700328" derivedAnchor="PseudoDynamicTesting">
        <front>
          <title>Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems</title>
          <author initials="M." surname="Ficco" fullname="Massimo Ficco">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Esposito" fullname="Christian Esposito">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Y." surname="Xiang" fullname="Yang Xiang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Palmieri" fullname="Francesco Palmieri">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="November"/>
        </front>
        <refcontent>IEEE Communications Magazine, vol. 55, no. 11, pp. 98-104</refcontent>
        <seriesInfo name="DOI" value="10.1109/mcom.2017.1700328"/>
      </reference>
      <reference anchor="Renart" quoteTitle="true" target="https://doi.org/10.1109/icfec.2017.18" derivedAnchor="Renart">
        <front>
          <title>Data-Driven Stream Processing at the Edge</title>
          <author initials="E." surname="Renart" fullname="Eduard Gibert Renart">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Diaz-Montes" fullname="Javier Diaz-Montes">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Parashar" fullname="Manish Parashar">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="May"/>
        </front>
        <refcontent>2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/icfec.2017.18"/>
      </reference>
      <reference anchor="I-D.hsingh-coinrg-reqs-p4comp" target="https://datatracker.ietf.org/doc/html/draft-hsingh-coinrg-reqs-p4comp-03" quoteTitle="true" derivedAnchor="REQS-P4COMP">
        <front>
          <title>Requirements for P4 Program Splitting for Heterogeneous Network Nodes</title>
          <author initials="H." surname="Singh" fullname="Hemant Singh">
            <organization showOnFrontPage="true">MNK Labs and Consulting</organization>
          </author>
          <author initials="M." surname="Montpetit" fullname="Marie-Jose Montpetit">
            <organization showOnFrontPage="true">Concordia Univeristy</organization>
          </author>
          <date month="February" day="18" year="2021"/>
          <abstract>
            <t indent="0">   For distributed computing, the P4 research community has published a
   paper to show how to split a P4 program into sub-programs which run
   on heterogeneous network nodes in a network.  Examples of nodes are a
   network switch, a smartNIC, or a host machine.  The paper has
   developed artifacts to split program based on latency, data rate,
   cost, etc.  However, the paper does not mention any requirements.  To
   provide guidance, this document covers requirements for splitting P4
   programs for heterogeneous network nodes.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-hsingh-coinrg-reqs-p4comp-03"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="I-D.irtf-t2trg-rest-iot" target="https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-rest-iot-13" quoteTitle="true" derivedAnchor="REST-IOT">
        <front>
          <title>Guidance on RESTful Design for Internet of Things Systems</title>
          <author initials="A." surname="Keränen" fullname="Ari Keränen">
            <organization showOnFrontPage="true">Ericsson</organization>
          </author>
          <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
            <organization showOnFrontPage="true">Siemens</organization>
          </author>
          <author initials="K." surname="Hartke" fullname="Klaus Hartke">
         </author>
          <date month="January" day="25" year="2024"/>
          <abstract>
            <t indent="0">   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-13"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="RFC6291" target="https://www.rfc-editor.org/info/rfc6291" quoteTitle="true" derivedAnchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson"/>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
          <date month="June" year="2011"/>
          <abstract>
            <t indent="0">At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t indent="0">This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" quoteTitle="true" derivedAnchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t indent="0">The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t indent="0">CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC7390" target="https://www.rfc-editor.org/info/rfc7390" quoteTitle="true" derivedAnchor="RFC7390">
        <front>
          <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
          <author fullname="A. Rahman" initials="A." role="editor" surname="Rahman"/>
          <author fullname="E. Dijk" initials="E." role="editor" surname="Dijk"/>
          <date month="October" year="2014"/>
          <abstract>
            <t indent="0">The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for constrained devices and constrained networks. It is anticipated that constrained devices will often naturally operate in groups (e.g., in a building automation scenario, all lights in a given room may need to be switched on/off as a group). This specification defines how CoAP should be used in a group communication context. An approach for using CoAP on top of IP multicast is detailed based on existing CoAP functionality as well as new features introduced in this specification. Also, various use cases and corresponding protocol flows are provided to illustrate important concepts. Finally, guidance is provided for deployment in various network topologies.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7390"/>
        <seriesInfo name="DOI" value="10.17487/RFC7390"/>
      </reference>
      <reference anchor="RFC8578" target="https://www.rfc-editor.org/info/rfc8578" quoteTitle="true" derivedAnchor="RFC8578">
        <front>
          <title>Deterministic Networking Use Cases</title>
          <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
          <date month="May" year="2019"/>
          <abstract>
            <t indent="0">This document presents use cases for diverse industries that have in common a need for "deterministic flows". "Deterministic" in this context means that such flows provide guaranteed bandwidth, bounded latency, and other properties germane to the transport of time-sensitive data. These use cases differ notably in their network topologies and specific desired behavior, providing as a group broad industry context for Deterministic Networking (DetNet). For each use case, this document will identify the use case, identify representative solutions used today, and describe potential improvements that DetNet can enable.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8578"/>
        <seriesInfo name="DOI" value="10.17487/RFC8578"/>
      </reference>
      <reference anchor="Schafer" quoteTitle="true" target="https://doi.org/10.1109/icdcsw.2016.22" derivedAnchor="Schafer">
        <front>
          <title>Tasklets: Overcoming Heterogeneity in Distributed Computing Systems</title>
          <author initials="D." surname="Schäfer" fullname="Dominik Schäfer">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Edinger" fullname="Janick Edinger">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="VanSyckel" fullname="Sebastian VanSyckel">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Paluska" fullname="Justin Mazzola Paluska">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Becker" fullname="Christian Becker">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <refcontent>2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW)</refcontent>
        <seriesInfo name="DOI" value="10.1109/icdcsw.2016.22"/>
      </reference>
      <reference anchor="Senel" quoteTitle="true" target="https://doi.org/10.1145/3434770.3459737" derivedAnchor="Senel">
        <front>
          <title>EdgeNet: A Multi-Tenant and Multi-Provider Edge Cloud</title>
          <author initials="B." surname="Şenel" fullname="Berat Can Şenel">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Mouchet" fullname="Maxime Mouchet">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Cappos" fullname="Justin Cappos">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="O." surname="Fourmaux" fullname="Olivier Fourmaux">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Friedman" fullname="Timur Friedman">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="McGeer" fullname="Rick McGeer">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <refcontent>Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3434770.3459737"/>
      </reference>
      <reference anchor="I-D.bernardos-sfc-fog-ran" target="https://datatracker.ietf.org/doc/html/draft-bernardos-sfc-fog-ran-10" quoteTitle="true" derivedAnchor="SFC-FOG-RAN">
        <front>
          <title>Service Function Chaining Use Cases in Fog RAN</title>
          <author initials="C. J." surname="Bernardos" fullname="Carlos J. Bernardos">
            <organization showOnFrontPage="true">UC3M</organization>
          </author>
          <author initials="A." surname="Mourad" fullname="Alain Mourad">
            <organization showOnFrontPage="true">InterDigital</organization>
          </author>
          <date month="October" day="22" year="2021"/>
          <abstract>
            <t indent="0">   Fog Radio Access Networks (RAN) refers to the part of the RAN that is
   virtualized at the very edge of the network, even at the end-user
   device.  Fog RAN support is considered critical for the 5G mobile
   network architectures currently being developed in various research,
   standardization and industry forums.  Since fog RAN builds on top of
   virtualization and can involve several virtual functions running on
   different virtualized resources, Service function chaining (SFC)
   support for the fog RAN will be critical.  This document describes
   the overall fog RAN approach and also gives some use cases.  Finally
   it proposes some requirements to be considered in the development of
   the SFC architecture and related protocols.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bernardos-sfc-fog-ran-10"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="Shi" quoteTitle="true" target="https://doi.org/10.1109/jiot.2016.2579198" derivedAnchor="Shi">
        <front>
          <title>Edge Computing: Vision and Challenges</title>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Cao" fullname="Jie Cao">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Y." surname="Li" fullname="Youhuizi Li">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="L." surname="Xu" fullname="Lanyu Xu">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <refcontent>IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646</refcontent>
        <seriesInfo name="DOI" value="10.1109/jiot.2016.2579198"/>
      </reference>
      <reference anchor="SimulatingFog" quoteTitle="true" target="https://doi.org/10.3390/fi11030055" derivedAnchor="SimulatingFog">
        <front>
          <title>Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges</title>
          <author initials="S." surname="Svorobej" fullname="Sergej Svorobej">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Takako Endo" fullname="Patricia Takako Endo">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Bendechache" fullname="Malika Bendechache">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Filelis-Papadopoulos" fullname="Christos Filelis-Papadopoulos">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Giannoutakis" fullname="Konstantinos Giannoutakis">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="G." surname="Gravvanis" fullname="George Gravvanis">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Tzovaras" fullname="Dimitrios Tzovaras">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Byrne" fullname="James Byrne">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Lynn" fullname="Theo Lynn">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="February"/>
        </front>
        <refcontent>Future Internet, vol. 11, no. 3, pp. 55</refcontent>
        <seriesInfo name="DOI" value="10.3390/fi11030055"/>
      </reference>
      <reference anchor="Stanciu" quoteTitle="true" target="https://doi.org/10.1145/3434770.3459735" derivedAnchor="Stanciu">
        <front>
          <title>Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption</title>
          <author initials="V." surname="Stanciu" fullname="Valeriu-Daniel Stanciu">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Steen" fullname="Maarten van Steen">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Dobre" fullname="Ciprian Dobre">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Peter" fullname="Andreas Peter">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2021" month="April"/>
        </front>
        <refcontent>Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking</refcontent>
        <seriesInfo name="DOI" value="10.1145/3434770.3459735"/>
      </reference>
      <reference anchor="Tanveer" quoteTitle="true" target="https://doi.org/10.1109/AIC55036.2022.9848948" derivedAnchor="Tanveer">
        <front>
          <title>Smart Agriculture System using IoT</title>
          <author initials="S." surname="Tanveer" fullname="S. Ayesha Tanveer"/>
          <author initials="N." surname="Sree" fullname="Namala Meghana Sai Sree"/>
          <author initials="B." surname="Bhavana" fullname="Bheemisetty Bhavana"/>
          <author initials="D." surname="Varsha" fullname="Devana Hima Varsha"/>
          <date year="2022" month="August"/>
        </front>
        <refcontent>2022 IEEE World Conference on Applied Intelligence and Computing (AIC), Sonbhadra, India, pp. 482-486</refcontent>
        <seriesInfo name="DOI" value="10.1109/AIC55036.2022.9848948"/>
      </reference>
      <reference anchor="Weiner" quoteTitle="true" target="https://doi.org/10.1109/icc.2014.6883918" derivedAnchor="Weiner">
        <front>
          <title>Design of a low-latency, high-reliability wireless communication system for control applications</title>
          <author initials="M." surname="Weiner" fullname="Matthew Weiner">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Jorgovanovic" fullname="Milos Jorgovanovic">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Sahai" fullname="Anant Sahai">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Nikolie" fullname="Borivoje Nikolie">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2014" month="June"/>
        </front>
        <refcontent>2014 IEEE International Conference on Communications (ICC)</refcontent>
        <seriesInfo name="DOI" value="10.1109/icc.2014.6883918"/>
      </reference>
      <reference anchor="Yangui" quoteTitle="true" target="https://doi.org/10.1109/lanman.2016.7548853" derivedAnchor="Yangui">
        <front>
          <title>A platform as-a-service for hybrid cloud/fog environments</title>
          <author initials="S." surname="Yangui" fullname="Sami Yangui">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Ravindran" fullname="Pradeep Ravindran">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="O." surname="Bibani" fullname="Ons Bibani">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Glitho" fullname="Roch H. Glitho">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="N." surname="Ben Hadj-Alouane" fullname="Nejib Ben Hadj-Alouane">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Morrow" fullname="Monique J. Morrow">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Polakos" fullname="Paul A. Polakos">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="June"/>
        </front>
        <refcontent>2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)</refcontent>
        <seriesInfo name="DOI" value="10.1109/lanman.2016.7548853"/>
      </reference>
      <reference anchor="Yates" quoteTitle="true" target="https://doi.org/10.1109/tit.2018.2871079" derivedAnchor="Yates">
        <front>
          <title>The Age of Information: Real-Time Status Updating by Multiple Sources</title>
          <author initials="R." surname="Yates" fullname="Roy D. Yates">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Kaul" fullname="Sanjit K. Kaul">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="March"/>
        </front>
        <refcontent>IEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1807-1827</refcontent>
        <seriesInfo name="DOI" value="10.1109/tit.2018.2871079"/>
      </reference>
      <reference anchor="Yousefpour" quoteTitle="true" target="https://doi.org/10.1016/j.sysarc.2019.02.009" derivedAnchor="Yousefpour">
        <front>
          <title>All one needs to know about fog computing and related edge computing paradigms: A complete survey</title>
          <author initials="A." surname="Yousefpour" fullname="Ashkan Yousefpour">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Fung" fullname="Caleb Fung">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Nguyen" fullname="Tam Nguyen">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Kadiyala" fullname="Krishna Kadiyala">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Jalali" fullname="Fatemeh Jalali">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Niakanlahiji" fullname="Amirreza Niakanlahiji">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Kong" fullname="Jian Kong">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Jue" fullname="Jason P. Jue">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2019" month="September"/>
        </front>
        <refcontent>Journal of Systems Architecture, vol. 98, pp. 289-330</refcontent>
        <seriesInfo name="DOI" value="10.1016/j.sysarc.2019.02.009"/>
      </reference>
      <reference anchor="Yue" quoteTitle="true" target="https://doi.org/10.3389/fenrg.2022.900298" derivedAnchor="Yue">
        <front>
          <title>Assisting Smart Construction With Reliable Edge Computing Technology</title>
          <author initials="Q." surname="Yue" fullname="Yue Qiang"/>
          <author initials="S." surname="Mu" fullname="Song Mu"/>
          <author initials="L." surname="Zhang" fullname="Longguan Zhang"/>
          <author initials="Z." surname="Wang" fullname="Zhun Wang"/>
          <author initials="Z." surname="Zhang" fullname="Zhonghua Zhang"/>
          <author initials="X." surname="Zhang" fullname="Xing Zhang"/>
          <author initials="Y." surname="Wang" fullname="Yongge Wang"/>
          <author initials="Z." surname="Miao" fullname="Zhuang Miao"/>
          <date month="May" year="2022"/>
        </front>
        <refcontent>Frontiers in Energy Research, Sec. Smart Grids, Vol. 10</refcontent>
        <seriesInfo name="DOI" value="10.3389/fenrg.2022.900298"/>
      </reference>
      <reference anchor="Zhang" quoteTitle="true" target="https://doi.org/10.1109/hotweb.2016.12" derivedAnchor="Zhang">
        <front>
          <title>Firework: Big Data Sharing and Processing in Collaborative Edge Environment</title>
          <author initials="Q." surname="Zhang" fullname="Quan Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="X." surname="Zhang" fullname="Xiaohong Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Q." surname="Zhang" fullname="Qingyang Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="Shi" fullname="Weisong Shi">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="H." surname="Zhong" fullname="Hong Zhong">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2016" month="October"/>
        </front>
        <refcontent>2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)</refcontent>
        <seriesInfo name="DOI" value="10.1109/hotweb.2016.12"/>
      </reference>
      <reference anchor="Zhang2" quoteTitle="true" target="https://doi.org/10.1109/access.2018.2820162" derivedAnchor="Zhang2">
        <front>
          <title>Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues</title>
          <author initials="J." surname="Zhang" fullname="Jiale Zhang">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Chen" fullname="Bing Chen">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="Y." surname="Zhao" fullname="Yanchao Zhao">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="X." surname="Cheng" fullname="Xiang Cheng">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="F." surname="Hu" fullname="Feng Hu">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="March"/>
        </front>
        <refcontent>IEEE Access, vol. 6, pp. 18209-18237</refcontent>
        <seriesInfo name="DOI" value="10.1109/access.2018.2820162"/>
      </reference>
    </references>
    <section anchor="acknowledgements" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank <contact fullname="Joo-Sang Youn"/>, <contact fullname="Akbar Rahman"/>, <contact fullname="Michel Roy"/>, <contact fullname="Robert Gazda"/>, <contact fullname="Rute Sofia"/>, <contact fullname="Thomas Fossati"/>, <contact fullname="Chonggang Wang"/>, <contact fullname="Marie-José Montpetit"/>, <contact fullname="Carlos J. Bernardos"/>, <contact fullname="Milan Milenkovic"/>, <contact fullname="Dale Seed"/>, <contact fullname="JaeSeung Song"/>, <contact fullname="Roberto Morabito"/>, <contact fullname="Carsten Bormann"/>, and <contact fullname="Ari Keränen"/> for their valuable comments and suggestions on this document.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="J." surname="Hong" fullname="Jungha Hong">
        <organization showOnFrontPage="true">ETRI</organization>
        <address>
          <postal>
            <street>218 Gajeong-ro, Yuseung-Gu</street>
            <city>Daejeon</city>
            <code>34129</code>
            <country>Republic of Korea</country>
          </postal>
          <email>jhong@etri.re.kr</email>
        </address>
      </author>
      <author initials="Y-G." surname="Hong" fullname="Yong-Geun Hong">
        <organization showOnFrontPage="true">Daejeon University</organization>
        <address>
          <postal>
            <street>62 Daehak-ro, Dong-gu</street>
            <city>Daejeon</city>
            <code>300716</code>
            <country>Republic of Korea</country>
          </postal>
          <email>yonggeun.hong@gmail.com</email>
        </address>
      </author>
      <author initials="X." surname="de Foy" fullname="Xavier de Foy">
        <organization showOnFrontPage="true">InterDigital Communications, LLC</organization>
        <address>
          <postal>
            <street>1000 Sherbrooke West</street>
            <city>Montreal</city>
            <code>H3A 3G4</code>
            <country>Canada</country>
          </postal>
          <email>xavier.defoy@interdigital.com</email>
        </address>
      </author>
      <author initials="M." surname="Kovatsch" fullname="Matthias Kovatsch">
        <organization showOnFrontPage="true">Huawei Technologies Duesseldorf GmbH</organization>
        <address>
          <postal>
            <street>Riesstr. 25 C // 3.OG</street>
            <city>Munich</city>
            <code>80992</code>
            <country>Germany</country>
          </postal>
          <email>ietf@kovatsch.net</email>
        </address>
      </author>
      <author initials="E." surname="Schooler" fullname="Eve Schooler">
        <organization showOnFrontPage="true">University of Oxford</organization>
        <address>
          <postal>
            <street>Parks Road</street>
            <city>Oxford</city>
            <code>OX1 3PJ</code>
            <country>United Kingdom</country>
          </postal>
          <email>eve.schooler@gmail.com</email>
        </address>
      </author>
      <author initials="D." surname="Kutscher" fullname="Dirk Kutscher">
        <organization abbrev="HKUST(GZ)" showOnFrontPage="true">Hong Kong University of Science and Technology (Guangzhou)</organization>
        <address>
          <postal>
            <street>No.1 Du Xue Rd</street>
            <city>Guangzhou</city>
            <country>China</country>
          </postal>
          <email>ietf@dkutscher.net</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
