Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys52 (6):1-36,2019.Type:Article
Date Reviewed: Jun 17 2022

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies that “edge” does not refer to a single spatial position but to a multitude of options for (physically) placing the different technologies required for a true end-to-end IoT solution.

Four of these technology options are briefly introduced, discussed, and superficially compared in the first part (eight pages) of the survey, with the bulk being devoted to selectively and shortly presenting current (13 pages) and potential future (four pages) research topics for the respective technologies.

Besides presenting the two well-known concepts of multi-access edge computing (still called “mobile edge computing,” which is now obsolete) and fog computing, I found the inclusion of transparent computing and cloudlets very interesting. The technologies are explained on a level accessible to anyone interested in information technology on a fairly general level, and largely good. As always, the authors fail to provide good criteria for differentiating between fog and edge.

Current research topics cited revolve around energy optimization, latency minimization, the ubiquitous security and privacy concerns, and, surprisingly, caching. Topics are typically described in a short paragraph and, apparently, not ordered or further structured in any way.

This style continues in Section 6, “Future Research Directions,” which contains possibilities such as block-streaming service loading, lightweight virtualization, and flexible network operating systems (and again security).

The survey is easily accessible and contains lots of concepts and stimulating facts. It is recommended for the non-IoT specialist with interests in one of the several topics indicated here. Experts, though, should be aware that the content reflects the state of the art as of January 2019.

Reviewer:  Christoph F. Strnadl Review #: CR147456 (2208-0116)
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Human Factors (H.1.2 ... )
 
 
Cloud Computing (C.2.4 ... )
 
 
Distributed Architectures (C.1.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Human Factors": Date
A theory of computer semiotics
Andersen P., Cambridge University Press, New York, NY, 1990. Type: Book (9780521393362)
Aug 1 1992
An experimental comparison of tabular and graphic data presentation
Powers M., Lashley C., Sanchez P., Shneiderman B. International Journal of Man-Machine Studies 20(6): 545-566, 1984. Type: Article
May 1 1985
Organizing for human factors
Thomas J. (ed)  Human factors and interactive computer systems (, New York,461984. Type: Proceedings
May 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy