1. Introduction
Cloud computing (CC) technology provides computing and storage services to users
in datacenters that are multiple hops away from the user's devices or data sources
[1]. CC becomes problematic when latency-sensitive Internet of Things (IoT) applications
demand quick response to take instantaneous measures as every time the request has
to travel back to the cloud node, increasing backhaul network traffic and congestion,
which ultimately increase the delay. To overcome latency issues incurred by the CC
paradigm, the edge computing (EC) concept was introduced by the European Telecommunication
Standards Institute (ETSI), which provides computation, storage, and network optimization
at the edge of the network in closer proximity to IoT devices with fast processing
capabilities and quick response. The realization of EC can be divided into three models:
1) fog computing (FC), 2) cloudlets (CLs), and 3) mobile edge computing (MEC).
FC brings services and applications closer to users, and data processing takes
place locally on fog nodes rather than in the Cloud data center. It also supports
delay sensitivity, caching, offloading, location awareness, and mobility. A CL is
a small-scale data center and it brings the computation resources closer to the user’s
vicinity. CLs are located at the edge and provide services to mobile applications
with lower latency. The MEC integrates Cloud computing functionalities in mobile networks.
Initially, it was intended for mobile networks, but later on, it was used by fixed
and mobile networks and provides EC services.
Although EC exhibits strong potential to resolve various challenges of modern-day
communication, its current implementation is built on top of an inefficient address-based
communication model that often creates several issues, especially in highly dynamic
and complex scenarios. For instance, the current Internet Protocol (IP)-based communication
model assigns unique addresses to every node in the network, which may exhaust the
limited address space of both IPv4 and IPv6 in the future. Additionally, the long
IPv6 addresses are not suitable for every kind of node (for instance, constraint-oriented
nodes) in the network, so it makes address-based communication even less suitable
to fulfill future communication requirements. Moreover, from a data perspective, IoT
end-users are always interested in fetching the updated information rather than the
address or the location of the information source.
To resolve such issues, NDN [2], a realization of Information-Centric Networking (ICN), has appeared as an alternative
solution. Various other architectures have been proposed under the umbrella of ICN
to replace the address-oriented philosophy with a content-oriented one, such as 4WARD
[3,4], PSIRP [5], SAIL [6], PURSUIT [7], and CCN [8]. However, NDN has gained much interest from both academia and industry. NDN employs
names rather than addresses to fetch the content from the network and eliminate the
need for end-to-end connection between source and destination nodes. NDN offers many
attractive features, such as in-network caching, request aggregation, multi-homing,
and requester mobility. If combine with EC, these features efficiently resolve the
issues incurred by the traditional address-based communication model.
This paper presents a survey of various techniques proposed in the literature
that integrate EC with NDN. The aim is to provide maximum performance with ultra-low
latency, efficient content distribution, scalability, and security in the network.
The overall contributions of this paper are the following:
$\textbf{·}$ An overview of NDN forwarding is highlighted, and EC is presented
with its fundamentals.
$\textbf{·}$ A comprehensive survey of studies and approaches proposed in the
literature that combine ICN with EC services is discussed.
$\textbf{·}$ A comparative description of ICN-based EC strategies considered is
also presented in a tabular form that differentiates the studies' contributions in
terms of naming, routing, forwarding, mobility, and security.
$\textbf{·}$ In the end, the open research issues are presented with the difficulties
that the researchers may face to achieve the best performance.
The rest of the paper is organized as follows. Section II briefly describes the
fundamentals of NDN. An overview of the EC paradigm is outlined in Section III. Section
IV discusses the various proposals available in the literature that integrate ICN
with EC. Section V presents different research challenges in the domain of information-centric
edge computing. Finally, we conclude the paper in section VI.
2. Named Data Networking: In a nutshell
The NDN forwarding process is presented in Fig. 1. NDN follows a pull-based model of communication, and the application layer name
is forwarded directly to the network layer along the appropriate path for fetching
the desired content. The NDN nodes maintain three data structures: 1) a pending interest
table (PIT), 2) content store (CS), and 3) forwarding information base (FIB). A consumer
puts the desired content name in the interest packet, and it is forwarded to the network.
When an interest packet is received by a content router (CR) on an incoming interface,
the CS is checked. If the requested data is available in CS, the request is satisfied,
and a data packet is sent downstream.
If the requested data is not present in CS, then the PIT entries are checked for
whether the requested name exists in the queue. Records of the PIT entry in and out
are maintained in a single entry for every incoming and outgoing interest that was
received but not satisfied yet. The interest packet’s incoming interface IDs are maintained
in in-records, and out records’ interface IDs are maintained in out-records.
If a CR has a matching PIT entry, it updates the in-record and stores the incoming
interface of the current request. However, if the PIT entry does not exist, the interest
packet is forwarded to the producer using FIB long prefix matching. The FIB can have
more than one interface for a single prefix name. Once the interest packet reaches
the producer, it may respond with the content itself or content name. When the data
packet arrives at a CR, it looks to the corresponding PIT entry and forwards data
to all downstream interface IDs. Finally, it removes the PIT entry, and data is stored
in CS.
3. An overview of Edge Computing
CC offers centralized computing storage and network resources. Such clouds are
referred to as Cloud data centers. Data centers work with IP networks, and the core
is cellular networks. With the advent of cellular, tablets, and laptops, the demands
for network services increased. Today's mobile devices are powerful but may not accommodate
powerful applications like virtual reality (VR) and augmented reality (AR) [9]. To extend the battery life and accommodate such high processing applications, the
mobile Cloud computing (MCC) concept was introduced [10]. The users can offload their tasks to Cloud data centers using the internet or cellular
network.
The emergence of the IoT has made a large number of devices’ interconnections
possible, and these devices generate a huge amount of data. Furthermore, applications
like drone flight control, AR/VR, online gaming, and smart transportation require
real-time processing with very low latency, even in milliseconds, and it creates challenges.
To overcome such challenges, EC was introduced to bring services closer to the end-users,
as demonstrated in Fig. 2. The first realization of EC ``Cloudlets'' was introduced in 2009 [11] that brings the computation resources to the users’ closer vicinity. Another concept
of EC, fog computing (FC), was introduced by CISCO in 2012 [12]. FC brings, applications, and services closer to mobile users, and data processing
takes place locally on fog devices rather than sending it to the Cloud for processing.
It also supports caching, offloading, location awareness, mobility, and delay-sensitive
applications. However, these EC proposals suffer from quality of experience (QoE)
and quality of services (QoS). The reason behind this is that computing is not enabled
for mobile networks.
To enable mobile networks with such applications and services, EC was introduced
by the ETSI and named MEC [13]. MEC integrates Cloud functionalities in mobile networks. Initially, it was intended
for mobile networks, but later on, it was used by mobile and fixed networks. Therefore,
the acronym MEC no longer refers to Mobile Edge Computing, and now, it is known as
Multiple Access Mobile Edge Computing [14]. Now, the concepts of edge, fog, MEC, MCC, and Cloudlets are under the umbrella of
EC.
Fig. 2. Edge computing architecture.
4. Information-centric Edge Computing
In this section, we describe the NDN/ICN with EC integration techniques and proposals.
We look in depth into how these approaches attempted NDN/ICN with edge integration.
The authors in one study [15] proposed an IoT-Named Computing Networking strategy (IoT-NCN). The NDN architecture
is extended for IoT data stream processing at the network edge. The network edge behavior
turns into a dynamic computing environment for IoT applications in the data processing.
Users' requests are managed by the network nodes with their available computing capabilities.
In this technique, the naming and forwarding are defined in such a way that service
requests are guided towards close EC nodes to deliver services with low latency and
to avoid the flood of raw IoT data in the network. The performance of the proposal
is evaluated by using the ndnSim simulation toolkit. Experiment results show that
IoT-NCN outperforms in terms of reduction in traffic volume, exchanged data traffic,
and service provisioning time.
In another study [16], researchers introduced a fog-to-fog horizontal layer with information-centric networking.
An application in Fog-ICN transfers data horizontally in the fog layer and also distributes
data computation in fog nodes. It supports built-in mobility and named based connectionless
data communication. ICN-Fog reduces the services’ dependency on Cloud infrastructure.
This approach has benefits for fog computing, which include better mobility, shorter
latency, and higher data communication efficacy. NDN at the edge (NDNe) has been proposed
[17] for Cloudification in the network edge framework. NDNe is more novel than existing
techniques in terms of reducing the burden of developers by supporting name-based
communication, interest-data exchange, and in-network caching to fit the targeted
edge scenarios. A flexible naming makes it able to identify different cloud edge services
and connectionless primitives support nearby service provider discovery with the required
level.
The authors in another study [18] highlighted EC over NDN/ICN architectural opportunities. AR was utilized as a use
case in this approach to demonstrate the advantages of NDN architecture in EC. They
also discussed several solutions about compute reuse, resource discovery, security,
and mobility management. Different design options and tradeoffs have also been discussed
in this paper.
In another study [19], the Named Function as a Service (NFaaS) approach was proposed. NFaaS extends the
NDN architecture that runs the functions in the network. It builds on lightweight
virtual machines that support dynamic custom code execution. Any network node can
download and run functions in the network, and functions can move in the network between
nodes to meet users’ demands. A Kernel store component was introduced in NFaaS that
stores functions and make decisions for local function execution. It also includes
a routing protocol and several forwarding techniques that support function deployments
and migrations within the network. To validate the designed approach, simulations
were carried out, which demonstrate that the NFaaS deploys delay-sensitive functions
closer to the edge and other functions closer to the core.
A pioneer Named Function Networking (NFN) [20] scheme was proposed by other authors. The authors extended the Named Data Network
in NFN to the edge. In traditional NDN/ICN, the interest packets contain the name
field of the content, while in NFN, they contain not only the name of content, but
also expressions for named functions. The network plays the role of being in charge
of computing the results and also resolves the forwarding plane of NDN. Several functions
make NFN constrained in many scenarios like nodes in the network require sophisticated
processing, libraries, and custom code, with which is complex to express simple expressions
and having further function code.
To cope with the issue of IoT’s large data-volume generation at the network edge,
a researcher in another study [21] designed an Information-Centric edge (ICedge) approach, which is a general framework
that utilizes redundant computation at the edge. It runs on top of NDN and handles
the low-level network communications on behalf of IoT applications. It is a fully
distributed framework, and its features include seamlessly bringing users on-board
to the edge node network, delivering application tasks to edge nodes for timely execution,
and providing a network-based mechanism to enable users to use already executed tasks'
results, which is called "compute reuse." This results in lower task completion time
and more efficient use of edge resources.
An EC service model based on ICN has been proposed in another study [22], which is designed to support efficient EC service provision. In this scheme, a naming
scheme and a push-based service session model were designed for edge services. Secondly,
for appropriate edge server selection, two forwarding strategies are included, which
achieve load balancing. Finally, they presented a real-world prototype. The proposed
scheme was evaluated by using ndnSIM v2.7, and they found that the proposed solution
outperforms existing approaches.
R.Ullah et al. [23] proposed an ICN-capable radio access network architecture for 5G EC. This architecture
offers device to device (D2D) communication and supports the ICN application layer
at the base station. Furthermore, caching of ICN/Edge is useful only for static content.
Dynamic content requests have to traverse the core network to cease latency in 5G
networks. To solve this issue, an ICN-naming-based content prefetching strategy was
designed. The ndnSim toolkit was employed to validate the proposed scheme, and results
showed that the scheme achieves a higher cache hit ratio and also lower delays as
compared with traditional existing works on ICN for 5G.
In another study [24], a conceptual fog framework with ICN was introduced. The ICN is used as an API for
ubiquitous computing. The ICN cache is taken to the edge nodes using Fog computing.
It is achieved as an off-network cache by referring object names with IP. This practice
makes available information access on Cloud in the IoE close to users. Fog is used
as an edge processing node in the content store that depicts the caching and makes
it available off-path. Fog in this proposal provides processing, computing, and storage
at the edge with added benefits of heterogeneity for IoT.
A researcher in another study [25] proposed IoT equipment-assisted caching multimedia (EACM) for ICN for the improvement
of user experience. To attain this, they designed location prediction and smart caching
strategies using machine learning, which predicts user interest. In this way, the
users’ interest content can be driven to the edge node from the server. Furthermore,
for improved caching utilization, an optimized caching algorithm was designed. The
experimental results showed that the proposed strategy outperforms in caching mobile
multimedia content, which also optimized the cache hit ratio and minimized the access
time as compared to existing approaches. In ICN architecture, data is stored in the
content store, which enables a user to access data in closer proximity.
Routers have limited storage capacity, and the CS can suffer from massive content
storage. To enhance the in-network data availability, Wang et al. [26] proposed a framework that uses fog computing as a middle layer for communication
with the underlying network and global ICN network. Data is preprocessed and classified
in the fog layer and then transferred to ICN. In this way, this approach can reduce
the total amount of caching content by labeling the users’ shareable and dynamic data.
This approach also proved that the limited CS capacity cannot be a profitable in-network
caching form.
A disaster relief approach was designed by the authors in another study [27], which is a combination of Fog computing and ICN. It solves the problem of fast communication
and emergency networking during earthquakes and other natural disasters. Their proposed
idea is six degrees of separation theory (SDST), which achieves information-centric
fog computing (ICFC) disaster relief. The aim was to model a network node’s relationship
and to design a name-routing strategy by using SDST. The proposed strategy was evaluated
against existing routing strategies in ICN, and they found that it helps to improve
working efficiency in post-disaster scenarios.
Table 2 describes a summary of contributions of the existing research and studies. As naming,
routing, caching, mobility, and security are core functionalities of ICN/NDN networking
architecture, the existing literature mainly focuses on these core features to achieve
efficient performance in the Edge with NDN integration. It is evident from the table
that most of the proposals consider naming, routing, forwarding, and caching in their
schemes, whereas mobility and security features are either treated superficially or
used as the default implementation. As mobility and security are also equally important,
further work in these directions is required to devise novel and efficient mobility
and security solutions for the ICN-edge integrated architecture.
In Table 3, the pros and cons of the surveyed schemes are presented. At first, the pros are
presented in terms of 1) load-balancing, 2) resource/data recovery, 3) QoS, and 4)
maximum cache utilization. As QoS is the fundamental characteristic of ICN networking,
most of the surveyed schemes fulfill the QoS demand in the ICN integrated Edge paradigm.
In terms of load-balancing, almost 50% of schemes efficiently handle the workload
on the edge node. Although efficient resource discovery is an important research area
in ICN-based EC, only 5 surveyed schemes discussed the potential solutions. Similarly,
only two schemes fully leveraged the caching feature of ICN.
Concerning the limitations, as is evident from Table 3, the major limitation is that most of these schemes target a specific environment
such as disaster management and smart homes. Besides, these schemes require a specific
type of input to work efficiently. However, such solutions cannot be utilized in all
Edge or IoT environments. There are some other limitations, which include high processing
time, limited scalability, long delays, and fixed packet size.
Delay sensitivity is crucial in real-time environments such as healthcare and
smart industries; therefore, it cannot be ignored. High processing time also creates
issues in the environments where quick response is required. Thus, the proposed environment-specific
schemes do not scale well when the environment is changed. Despite this fact, most
of the solutions proposed in the literature target a specific environment are prone
to various scalability issues. Furthermore, some schemes assume fixed packet size
for communication. However, it cannot be applied to all scenarios. Moreover, some
of these schemes also ignored security concerns, despite being essential in edge-integrated
ICN environments. Considering these pros and cons of the existing literature, in section
V, we provide the open research issues and highlight the areas that require further
research efforts to propose an efficient solution in edge with ICN-integrated architecture.
Table 1. Frequently used acronyms.
NDN
|
Named Data Networking
|
MCC
|
Mobile Cloud Computing
|
EC
|
Edge Computing
|
AR
|
Augmented Reality
|
ICN
|
Information-Centric Networking
|
VR
|
Virtual Reality
|
CC
|
Cloud Computing
|
QoE
|
Quality of Experience
|
IoT
|
Internet of Things
|
QoS
|
Quality of Service
|
FC
|
Fog Computing
|
NFaaS
|
Named Function as a Service
|
CL
|
Cloudlets
|
IoE
|
Internet of Everything
|
MEC
|
Mobile Edge Computing
|
CR
|
Content Router
|
IP
|
Internet Protocol
|
FIB
|
Forwarding Information Base
|
PIT
|
Pending Interest Table
|
CS
|
content store
|
Table 2. Contributions of the related works.
Paper
|
Naming
|
Routing & Forwarding
|
Caching
|
Mobility
|
Security
|
[15]
|
✓
|
✓
|
✓
|
𝒳
|
𝒳
|
[16]
|
𝒳
|
𝒳
|
✓
|
✓
|
𝒳
|
[17]
|
✓
|
𝒳
|
✓
|
𝒳
|
𝒳
|
[18]
|
𝒳
|
✓
|
✓
|
✓
|
✓
|
[19]
|
✓
|
✓
|
✓
|
✓
|
𝒳
|
[20]
|
✓
|
✓
|
✓
|
✓
|
✓
|
[21]
|
✓
|
✓
|
✓
|
𝒳
|
𝒳
|
[22]
|
✓
|
✓
|
𝒳
|
𝒳
|
𝒳
|
[23]
|
✓
|
✓
|
✓
|
𝒳
|
𝒳
|
[24]
|
✓
|
𝒳
|
✓
|
𝒳
|
𝒳
|
[25]
|
𝒳
|
𝒳
|
✓
|
✓
|
𝒳
|
[26]
|
𝒳
|
✓
|
✓
|
𝒳
|
𝒳
|
[27]
|
✓
|
✓
|
𝒳
|
𝒳
|
𝒳
|
Table 3. PROS and CONS of the contributed related works.
Work
|
Research Approach
|
[15]
|
[16]
|
[17]
|
[18]
|
[19]
|
[20]
|
[21]
|
[22]
|
[23]
|
[24]
|
[25]
|
[26]
|
[27]
|
Pros
|
Load Balancing
|
✓
|
✓
|
|
✓
|
|
✓
|
✓
|
✓
|
|
|
|
|
|
Resource/Data Discovery
|
✓
|
✓
|
✓
|
✓
|
|
|
✓
|
|
|
|
|
|
|
QoS/Quick Task Response
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
✓
|
Max-Cache Hit
|
|
|
|
|
|
|
|
|
✓
|
|
✓
|
|
|
Cons
|
Specific environment
|
✓
|
|
✓
|
|
|
|
✓
|
✓
|
✓
|
|
|
|
✓
|
Specific Input
|
|
|
|
✓
|
|
|
|
|
|
|
|
|
|
Insecure
|
|
✓
|
|
✓
|
|
|
|
|
|
✓
|
|
|
|
Limited-scalability
|
|
|
|
✓
|
|
|
✓
|
|
|
|
|
|
✓
|
High completion
time
|
|
|
|
|
|
✓
|
|
|
|
|
|
|
|
Delay-insensitive
|
|
|
|
|
|
✓
|
|
|
|
|
|
|
|
Fixed packet size
|
✓
|
|
|
|
|
|
|
|
|
|
|
|
|
5. Open Research Issues
It is evident from the literature review in the previous section that the proposed
schemes have paved the way for the integration of ICN with an edge. Despite this,
there are still some constraints and challenges in the ICN integrated edge paradigm
that need to be addressed efficiently. These challenges and constraints are described
as follows.
$\textbf{1.Computing and Caching}$ are two core features of EC that enable the
content and computations available in close proximity to end-users and/or IoT devices
to speed up the retrieval process with minimal latency. However, the ICN-enabled intermediate
network nodes may not be able to store and compute all the requests due to their limited
resources, and as a result, some of the requests must be offloaded to the edge or
cloud nodes. Keeping in mind these fundamental requirements and network constraints,
the integration of ICN with EC brought forth various challenges, such as 1) what to
cache locally on the intermediate network nodes since content-oriented IoT devices
produce a huge amount of content, and 2) how to split the execution of computational
requests among intermediate nodes and edge nodes to enable parallelism and to speed
up the computational process. The edge nodes and the intermediate nodes should store
meaningful data on a priority and popularity basis by conjunctionally deciding the
optimal location of content storage. Moreover, an optimal decision-making strategy
is also required to select and distribute the computational requests among ICN-enabled
intermediate nodes and the EC nodes in an ICN and edge combined architecture.
$\textbf{2. Naming}$ for ICN-based EC is another open issue since in the ICN paradigm,
the nodes access the services and contents by name, whereas the current EC architectures
work using inefficient address-based IP. Therefore, new naming schemes are required
that support ICN in edge or edge in ICN to facilitate accessibility, mobility, scalability,
and security requirements.
$\textbf{3. Name Resolution}$ for assigning a unique name to each computational
service and content may explode the naming space. As a result, the name resolution
entities in the network may face various challenges, such as storage limitations,
searching cost, and denial of services. Therefore, practical and flexible naming schemes
are required that ease the burden on name resolution entities in edge with ICN architecture
to achieve networking performance.
$\textbf{4. Routing and Forwarding}$ are other challenges in ICN with the EC paradigm.
In ICN, interest packets are sent hop-by-hop by employing name-based FIB lookup on
the intermediate forwarders, whereas in conventional EC, the forwarding and routing
are based on address lookup. In ICN, the incoming data packet name is compared with
the names in PIT, and on a successful match, the data packet is sent back to the consumer
node by following the reverse path. In contrast, since the packet forwarding in EC
is stateless, there is no guarantee that the data packet takes the same path from
where the request arrived. Therefore, it is of utmost importance to design a novel
and robust name-based routing and forwarding mechanism that efficiently routes the
compute request/response packets in the ICN-integrated EC paradigm.
$\textbf{5. Mobility:}$ Efficient mobility management schemes are also required
in Edge with the ICN paradigm. Consumer mobility is by default supported in ICN. However,
the producer mobility is still a challenging task in both ICN and EC. There is a need
to devise an efficient producer mobility scheme in ICN-integrated EC that tackles
the issues that may arise due to the long-lived computational services.
$\textbf{6. Security}$ in ICN is implemented at the packet level, whereas in IP-based
EC, it is managed at the channel level. The packet-level security in ICN utilizes
the existing public key infrastructure (PKI)-based digital certificates to validate
the authenticity and provenance of the content. To check whether the received content
is valid, the consumer extracts the name from the key-locator field in the data packet
that points to another data packet containing a certificate or public key. Once the
path is obtained, a consumer forwards another interest packet to fetch the certificate,
which might be available far away from the consumer. Such a validation technique is
not well suited for EC. As in EC, the goal is to bring the content closer to the end-user
to minimize the delay, and there should also be a mechanism to bring the certificates
closer to reduce the delay in the verification process. To resolve such delay issues,
further research is required in the ICN-based EC paradigm.
The above challenges need to be resolved to make ICN with edge-integrated architecture
the best performance network.
6. Conclusion
NDN and EC are considered as the future internet technologies and gained much
attention in the recent past. In this survey, we reviewed the existing approaches
that integrate ICN with EC. At first, a brief description of the EC paradigm and an
overview of NDN architecture along with its forwarding mechanism were presented. Secondly,
this paper discussed the features and limitations of proposed schemes and provided
a comprehensive comparison of these proposals. To this end, a comparative discussion
also shed light on the key performance improvement factors, such as how these approaches
achieve maximum performance by introducing the new algorithms and protocols that combine
the ICN with EC. Finally, the challenges that still need to be addressed to attain
maximum performance of ICN and EC synergy were also highlighted.
REFERENCES
Armbrust M., Fox A., Griffith R., Joseph A.D., Katz R., Konwinski A., Lee G., Patterson
D., Rabkin A., Stoica I., Zaharia M., 2010, A view of cloud computing., Communications
of the ACM, Vol. 53, No. 4, pp. 50-58
Shang W., Bannis A., Liang T., Wang Z., Yu Y., Afanasyev A., Thompson J., Burke J.,
Zhang B., Zhang L., April 2016, Named data networking of things., In 2016 IEEE first
international conference on internet-of-things design and implementation (IoTDI),
pp. 117-128
Ahlgren B., D'ambrosio M., Dannewitz C., Eriksson A., Golic J., Gr?nvall B., Horne
D., Lindgren A., M?mmel? O., Marchisio M., M?kel? J., 2010, Second netinf architecture
description. 4WARD EU FP7 Project, Deliverable D-6.2, Vol. 2
Ahlgren B., D'Ambrosio M., Marchisio M., Marsh I., Dannewitz C., Ohlman B., Pentikousis
K., Strandberg O., Rembarz R., Vercellone V., December 2008, Design considerations
for a network of information., In Proceedings of the 2008 ACM CoNEXT Conference, pp.
1-6
Jokela P., Zahemszky A., Esteve Rothenberg C., Arianfar S., Nikander P., 2009, LIPSIN:
line speed publish/subscribe inter-networking., ACM SIGCOMM Computer Communication
Review, Vol. 39, No. 4, pp. 195-206
https://sail-project.eu/ (accessed on 25 December 2020)
https://cordis.europa.eu/project/id/257217 (accessed on 25 December 2020
Jacobson V., Smetters D.K., Thornton J.D., Plass M.F., Briggs N.H., Braynard R.L.,
December 2009, Networking named content., In Proceedings of the 5th international
conference on Emerging networking experiments and technologies, pp. 1-12
Shannigrahi S., Mastorakis S., Ortega F.R., 2020, Next-generation networking and edge
computing for mixed reality real-time interactive systems., In 2020 IEEE International
Conference on Communications Workshops (ICC Workshops) IEEE
Dinh H.T., Lee C., Niyato D., Wang P., 2013, A survey of mobile cloud computing: architecture,
applications, and approaches., Wireless communi-cations and mobile computing, Vol.
13, No. 18, pp. 1587-1611
Satyanarayanan M., Bahl P., Caceres R., Davies N., 2009, The case for vm-based cloudlets
in mobile computing., IEEE pervasive Computing, Vol. 8, No. 4, pp. 14-23
Bonomi F., Milito R., Zhu J., Addepalli S., August 2012, Fog computing and its role
in the internet of things., In Proceedings of the first edition of the MCC workshop
on Mobile cloud computing, pp. 13-16
Hu Y.C., Patel M., Sabella D., Sprecher N., Young V., 2015, Mobile edge computing-A
key technology towards 5G., ETSI white paper, Vol. 11, No. 11, pp. 1-16
Porambage P., Okwuibe J., Liyanage M., Ylianttila M., Taleb T., 2018, Survey on multi-access
edge computing for internet of things realization., IEEE Communications Surveys &
Tutorials, Vol. 20, No. 4, pp. 2961-2991
Amadeo M., Campolo C., Molinaro A., Ruggeri G., May 2018, IoT data processing at the
edge with named data networking., In European Wireless 2018; 24th European Wireless
Conference VDE, pp. 1-6
Nguyen D., Shen Z., Jin J., Tagami A., December 2017, ICN-Fog: An information-centric
fog-to-fog architecture for data communications., In GLOBECOM 2017-2017 IEEE Global
Communi-cations Conference IEEE., pp. 1-6
Amadeo M., Campolo C., Molinaro A., 2016, NDNe: Enhancing named data networking to
support cloudification at the edge., IEEE Communications Letters, Vol. 20, No. 11,
pp. 2264-2267
Mtibaa A., Tourani R., Misra S., Burke J., Zhang L., July 2018, Towards edge computing
over named data networking., In 2018 IEEE International Conference on Edge Computing
(EDGE) IEEE., pp. 117-120
Kr?l M., Psaras I., September 2017, NFaaS: named function as a service., In Proceedings
of the 4th ACM Conference on Information-Centric Networking, pp. 134-144
Sifalakis M., Kohler B., Scherb C., Tschudin C., September 2014, An information centric
network for computing the distribution of computations., In Proceedings of the 1st
ACM Conference on Information-Centric Networking, pp. 137-146
Mastorakis S., Mtibaa A., Lee J., Misra S., 2020, ICedge: When Edge Computing Meets
Information-Centric Networking., IEEE Internet of Things Journal, Vol. 7, No. 5, pp.
4203-4217
Fan Z., Yang W., Tian K., December 2019, An Edge Computing Service Model Based on
Information-Centric Networking., In 2019 IEEE 25th International Conference on Parallel
and Distributed Systems (ICPADS) IEEE, pp. 498-505
Ullah R., Rehman M.A.U., Naeem M.A., Kim B.S., Mastorakis S., 2020, ICN with edge
for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks.,
Future Generation Computer Systems.
Abdullahi I., Arif S., Hassan S., 2015, Ubiquitous shift with information centric
network caching using fog computing., In Computational intelligence in information
systems Springer. Cham., pp. 327-335)
Tang Y., Guo K., Ma J., Shen Y., Chi T., 2019, A smart caching mechanism for mobile
multimedia in information centric networking with edge computing., Future Generation
Computer Systems, Vol. 91, pp. 590-600
Wang M., Wu J., Li G., Li J., Li Q., May 2017, Fog computing based content-aware taxonomy
for caching optimization in information-centric networks., In 2017 IEEE Conference
on Computer Communications Workshops (INFOCOM WKSHPS) IEEE, pp. 474-475)
Xu J., Ota K., Dong M., December 2018, Information-centric fog computing for disaster
relief., In International Conference on Smart Computing and Communication Springer
Cham., pp. 335-344
Author
Muhammad Imran received his bachelor’s degree in computer science from COMSATS
university Pakistan in 2015, and a master’s degree in computer science from Virtual
University of Pakistan in 2019. He is pursuing Ph.D. degree in software and communication
engineering with the Department of Electronics and Computer Engineering, Hongik University,
South Korea. His research interests are in the field of Cloud/edge computing, Internet
of Things, information-centric networking, and named data networking. He was working
as an educator in the school education department Punjab, Pakistan from 2016 to 2021.
Muhammad Atif Ur Rehman received a B.S. degree in electronics & communication from
The University of Lahore, Lahore, Pakistan, in 2013, and an M.S. degree in computer
science from the COMSATS Univer-sity Islamabad, Islamabad Campus, Pakistan, in 2016.
He is currently pursuing a Ph.D. degree with the Broadband Convergence Networks Laboratory
with the Department of Electronics and Computer Engineering, Hongik University, South
Korea. His major interests are in the field of information-centric wireless networks,
named data networking, edge computing, software defined networking, Internet of Things,
and 5th-Generation communication. From 2013 to 2018, he was working as a software
engineer & architect in leading IT companies in Pakistan. His responsibilities were
to write well-designed, testable, and efficient code, collaborate with other team
members to determine functional and non-functional requirements for new software or
applications, provide technical guidelines to other team members, and ensure software
meets all requirements of quality. He worked closely with a quality assurance team
to deliver high-quality and reliable products.
Byung-Seo Kim received his B.S. degree in electrical engineering from In-Ha University,
In-Chon, Korea, in 1998 and his M.S. and Ph.D. degrees in electrical and computer
engineering from the University of Florida in 2001 and 2004, respectively. His Ph.D.
study was supervised by Dr. Yuguang Fang. Between 1997 and 1999, he worked for Motorola
Korea Ltd., PaJu, Korea, as a computer integrated manufacturing (CIM) engineer in
Advanced Technology Research and Development (ATR&D). From January 2005 to August
2007, he worked for Motorola Inc., Schaumburg Illinois, as a Senior Software Engineer
in Networks and Enterprises. His research in Motorola Inc. was designing a protocol
and network architecture for wireless broadband mission-critical communications. From
2012 to 2014, he was the Chairman of the Department of Software and Communications
Engineering, Hongik University, Korea, where he is currently a professor. He is a
Senior IEEE Member and is serving as an Associative Editor of IEEE Access, Telecommunication
Systems, and the Journal of the Institute of Electrics and Information Engineers.
He also served as a Guest Editors of special issues of IEEE Internet of Things, IEEE
Access, International Journal of Distributed Sensor Networks (SAGE), Sensors, and
Applied Science. His work has appeared in around 240 publications and 32 patents.
His research interests include the design and development of efficient wireless/wired
networks including link-adaptable/cross-layer-based protocols, multi-protocol structures,
wireless CCNs/NDNs, mobile edge computing, physical layer design for broadband PLC,
and resource allocation algorithms for wireless networks.