Contributors |
|
xi | |
Introduction |
|
1 | (10) |
|
|
|
|
|
5 | (2) |
|
|
7 | (1) |
|
|
8 | (3) |
I Communication And Management Of Fog |
|
11 | (96) |
|
1 ParaDrop: An Edge Computing Platform in Home Gateways |
|
|
13 | (11) |
|
|
|
|
|
|
13 | (4) |
|
1.1.1 Enabling Multitenant Wireless Gateways and Applications through ParaDrop |
|
|
14 | (1) |
|
1.1.2 ParaDrop Capabilities |
|
|
15 | (2) |
|
1.2 Implementing Services for the ParaDrop Platform |
|
|
17 | (2) |
|
1.3 Develop Services for ParaDrop |
|
|
19 | (4) |
|
1.3.1 A Security Camera Service Using ParaDrop |
|
|
19 | (3) |
|
1.3.2 An Environmental Sensor Service Using ParaDrop |
|
|
22 | (1) |
|
|
23 | (1) |
|
2 Mind Your Own Bandwidth |
|
|
24 | (28) |
|
|
|
|
|
|
|
24 | (4) |
|
|
25 | (1) |
|
2.1.2 A Home Solution to a Home Problem |
|
|
25 | (3) |
|
|
28 | (1) |
|
2.3 Credit Distribution and Optimal Spending |
|
|
28 | (4) |
|
2.3.1 Credit Distribution |
|
|
29 | (2) |
|
2.3.2 Optimal Credit Spending |
|
|
31 | (1) |
|
2.4 An Online Bandwidth Allocation Algorithm |
|
|
32 | (3) |
|
2.4.1 Estimating Other Gateways' Spending |
|
|
32 | (2) |
|
2.4.2 Online Spending Decisions and App Prioritization |
|
|
34 | (1) |
|
2.5 Design and Implementation |
|
|
35 | (4) |
|
2.5.1 Traffic and Device Classification |
|
|
37 | (1) |
|
2.5.2 Rate Limiting Engine |
|
|
37 | (1) |
|
2.5.3 Traffic Prioritization Engine |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
39 | (2) |
|
2.6.2 Traffic Prioritization |
|
|
41 | (1) |
|
2.7 Gateway Sharing Results |
|
|
41 | (4) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (4) |
|
|
46 | (1) |
|
|
46 | (1) |
|
2.A.3 Proof of Proposition 2.1 |
|
|
47 | (1) |
|
2.A.4 Proof of Proposition 2.2 |
|
|
48 | (1) |
|
2.A.5 Proof of Proposition 2.3 |
|
|
49 | (1) |
|
2.A.6 Proof of Proposition 2.4 |
|
|
49 | (1) |
|
|
50 | (2) |
|
3 Socially-Aware Cooperative D2D and D4D Communications toward Fog Networking |
|
|
52 | (34) |
|
|
|
|
|
52 | (6) |
|
3.1.1 From Social Trust and Social Reciprocity to D2D Cooperation |
|
|
54 | (1) |
|
3.1.2 Smart Grid: An IoT Case for Socially-Aware Cooperative D2D and D4D Communications |
|
|
55 | (2) |
|
3.1.3 Summary of Main Results |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (3) |
|
3.3.1 Physical (Communication) Graph Model |
|
|
60 | (1) |
|
|
61 | (1) |
|
3.4 Socially-Aware Cooperative D2D and D4D Communications toward Fog Networking |
|
|
62 | (7) |
|
3.4.1 Social Trust-Based Relay Selection |
|
|
63 | (1) |
|
3.4.2 Social Reciprocity-Based Relay Selection |
|
|
63 | (5) |
|
3.4.3 Social Trust and Social Reciprocity-Based Relay Selection |
|
|
68 | (1) |
|
3.5 Network Assisted Relay Selection Mechanism |
|
|
69 | (6) |
|
3.5.1 Reciprocal Relay Selection Cycle Finding |
|
|
69 | (1) |
|
|
70 | (3) |
|
3.5.3 Properties of NARS Mechanism |
|
|
73 | (2) |
|
|
75 | (7) |
|
3.6.1 Erdos-Renyi Social Graph |
|
|
76 | (2) |
|
3.6.2 Real Trace Based Social Graph |
|
|
78 | (4) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (3) |
|
4 You Deserve Better Properties (From Your Smart Devices) |
|
|
86 | (21) |
|
|
4.1 Why We Need to Provide Better Properties |
|
|
86 | (1) |
|
4.2 Where We Need to Provide Better Properties |
|
|
87 | (1) |
|
4.3 What Properties We Need to Provide and How |
|
|
88 | (14) |
|
|
88 | (5) |
|
4.3.2 Predictable Performance |
|
|
93 | (6) |
|
|
99 | (3) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (4) |
II Storage And Computation In Fog |
|
107 | (82) |
|
5 Distributed Caching for Enhancing Communications Efficiency |
|
|
109 | (24) |
|
|
|
|
109 | (2) |
|
|
111 | (4) |
|
|
111 | (3) |
|
5.2.2 Adaptive Streaming from Helper Stations |
|
|
114 | (1) |
|
|
115 | (15) |
|
5.3.1 Cluster-Based Caching and D2D Communications |
|
|
115 | (3) |
|
5.3.2 IT LinQ-Based Caching and Communications |
|
|
118 | (8) |
|
|
126 | (4) |
|
5.4 Conclusions and Outlook |
|
|
130 | (1) |
|
|
131 | (2) |
|
6 Wireless Video Fog: Collaborative Live Streaming with Error Recovery |
|
|
133 | (26) |
|
|
|
|
|
133 | (3) |
|
|
136 | (2) |
|
6.3 System Operation and Network Model |
|
|
138 | (2) |
|
6.4 Problem Formulation and Complexity |
|
|
140 | (4) |
|
6.4.1 NC Packet Selection Optimization |
|
|
140 | (3) |
|
6.4.2 Broadcaster Selection Optimization |
|
|
143 | (1) |
|
6.4.3 Complexity Analysis |
|
|
144 | (1) |
|
6.5 VBCR: A Distributed Heuristic for Live Video with Cooperative Recovery |
|
|
144 | (6) |
|
6.5.1 Initial Information Exchange |
|
|
145 | (1) |
|
6.5.2 Cooperative Recovery |
|
|
145 | (2) |
|
6.5.3 Updated Information Exchange |
|
|
147 | (1) |
|
6.5.4 Video Packet Forwarding |
|
|
147 | (3) |
|
6.6 Illustrative Simulation Results |
|
|
150 | (6) |
|
|
156 | (1) |
|
|
156 | (3) |
|
7 Elastic Mobile Device Clouds: Leveraging Mobile Devices to Provide Cloud Computing Services at the Edge |
|
|
159 | (30) |
|
|
|
|
|
|
|
159 | (2) |
|
7.2 Design Space with Examples |
|
|
161 | (7) |
|
|
162 | (1) |
|
7.2.2 Computing while Charging |
|
|
163 | (1) |
|
|
164 | (2) |
|
|
166 | (2) |
|
7.3 FemtoCloud Performance Evaluation |
|
|
168 | (7) |
|
|
168 | (1) |
|
7.3.2 FemtoCloud Simulation Results |
|
|
169 | (4) |
|
7.3.3 FemtoCloud Prototype Evaluation |
|
|
173 | (2) |
|
7.4 Serendipity Performance Evaluation |
|
|
175 | (11) |
|
|
175 | (1) |
|
7.4.2 Serendipity's Performance Benefits |
|
|
176 | (3) |
|
7.4.3 Impact of Network Environment |
|
|
179 | (3) |
|
7.4.4 The Impact of the Job Properties |
|
|
182 | (4) |
|
|
186 | (1) |
|
|
186 | (3) |
III Applications Of Fog |
|
189 | (96) |
|
8 The Role of Fog Computing in the Future of the Automobile |
|
|
191 | (20) |
|
|
|
|
|
191 | (2) |
|
8.2 Current Automobile Electronic Architectures |
|
|
193 | (2) |
|
8.3 Future Challenges of Automotive E/E Architectures and Solution Strategies |
|
|
195 | (5) |
|
8.4 Future Automobiles as Fog Nodes on Wheels |
|
|
200 | (3) |
|
8.5 Deterministic FOG Nodes on Wheels Through Real-Time Computing and Time-Triggered Technologies |
|
|
203 | (6) |
|
8.5.1 Deterministic Fog Node Addressing the Scalability Challenge through Virtualization |
|
|
203 | (1) |
|
8.5.2 Deterministic Fog Node Addressing the Connectivity and Security Challenges |
|
|
204 | (2) |
|
8.5.3 Emerging Use Case of Deterministic Fog Nodes in Automotive Applications-Vehicle-Wide Virtualization |
|
|
206 | (3) |
|
|
209 | (1) |
|
|
209 | (2) |
|
9 Geographic Addressing for Field Networks |
|
|
211 | (23) |
|
|
|
211 | (3) |
|
|
211 | (1) |
|
9.1.2 Challenges of Field Networking |
|
|
212 | (2) |
|
9.2 Geographic Addressing |
|
|
214 | (1) |
|
9.3 SAGP: Wireless GA in the Field |
|
|
215 | (6) |
|
|
216 | (1) |
|
9.3.2 SAGP Retransmission Heuristics |
|
|
217 | (1) |
|
9.3.3 Example of SAGP Packet Propagation |
|
|
218 | (1) |
|
9.3.4 Followcast: Efficient SAGP Streaming |
|
|
219 | (1) |
|
9.3.5 Meeting the Challenges |
|
|
220 | (1) |
|
9.4 Georouting: Extending GA to the Cloud |
|
|
221 | (1) |
|
9.5 SGAF: A Multi-Tiered Architecture for Large-Scale GA |
|
|
222 | (3) |
|
9.5.1 Bridging Between Tiers |
|
|
223 | (2) |
|
9.5.2 Hybrid Security Architecture |
|
|
225 | (1) |
|
9.6 The AT&T Labs Geocast System |
|
|
225 | (1) |
|
|
226 | (6) |
|
|
226 | (4) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
232 | (2) |
|
10 Distributed Online Learning and Stream Processing for a Smarter Planet |
|
|
234 | (27) |
|
|
|
10.1 Introduction: Smarter Planet |
|
|
234 | (3) |
|
10.2 Illustrative Problem: Transportation |
|
|
237 | (1) |
|
10.3 Stream Processing Characteristics |
|
|
238 | (1) |
|
10.4 Distributed Stream Processing Systems |
|
|
239 | (5) |
|
|
239 | (1) |
|
10.4.2 Stream Processing Systems |
|
|
240 | (4) |
|
10.5 Distributed Online Learning Frameworks |
|
|
244 | (13) |
|
|
244 | (3) |
|
10.5.2 Systematic Framework for Online Distributed Ensemble Learning |
|
|
247 | (3) |
|
10.5.3 Online Learning of the Aggregation Weights |
|
|
250 | (4) |
|
10.5.4 Collision Detection Application |
|
|
254 | (3) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (3) |
|
11 Securing the Internet of Things: Need for a New Paradigm and Fog Computing |
|
|
261 | (24) |
|
|
|
|
|
|
261 | (2) |
|
11.2 New IoT Security Challenges That Necessitate Fundamental Changes to the Existing Security Paradigm |
|
|
263 | (5) |
|
11.2.1 Many Things Will Have Long Life Spans but Constrained and Difficult-to-Upgrade Resources |
|
|
264 | (1) |
|
11.2.2 Putting All IoT Devices Inside Firewalled Castles Will Become Infeasible or Impractical |
|
|
264 | (1) |
|
11.2.3 Mission-Critical Systems Will Demand Minimal-Impact Incident Responses |
|
|
265 | (1) |
|
11.2.4 The Need to Know the Security Status of a Vast Number of Devices |
|
|
266 | (2) |
|
11.3 A New Security Paradigm for the Internet of Things |
|
|
268 | (13) |
|
11.3.1 Help the Less Capable with Fog Computing |
|
|
269 | (3) |
|
11.3.2 Scale Security Monitoring to Large Number of Devices with Crowd Attestation |
|
|
272 | (5) |
|
11.3.3 Dynamic Risk-Benefit-Proportional Protection with Adaptive Immune Security |
|
|
277 | (4) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
281 | (4) |
Index |
|
285 | |