This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.
This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.
This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management.The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.
This Springerbrief presents a deep reinforcement learning approach to wireless systems to improve system performance. Particularly, deep reinforcement learning approach is used in cache-enabled opportunistic interference alignment wireless networks and mobile social networks. Simulation results with different network parameters are presented to show the effectiveness of the proposed scheme. There is a phenomenal burst of research activities in artificial intelligence, deep reinforcement learning and wireless systems. Deep reinforcement learning has been successfully used to solve many practical problems. For example, Google DeepMind adopts this method on several artificial intelligent projects with big data (e.g., AlphaGo), and gets quite good results.. Graduate students in electrical and computer engineering, as well as computer science will find this brief useful as a study guide. Researchers, engineers, computer scientists, programmers, and policy makers will also find this brief to be a useful tool.
This book constitutes revised selected papers from the 8th International Symposium on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2023, held in Amsterdam, The Netherlands, on September 5, 2023. The 13 full papers included in this book were carefully reviewed and selected from 24 submissions. They focus on algorithmic aspects of computing and data management in modern cloud-based systems interpreted broadly so as to include edge- and fog-based systems, cloudlets, cloud micro-services, virtualization environments, decentralized systems, as well as dynamic networks.
Over the past few years, the demand for data traffic has experienced explosive growth thanks to the increasing need to stay online. New applications of communications, such as wearable devices, autonomous systems, drones, and the Internet of Things (IoT), continue to emerge and generate even more data traffic with vastly different performance requirements. With the COVID-19 pandemic, the need to stay online has become even more crucial, as most of the fields, would they be industrial, educational, economic, or service-oriented, had to go online as best as they can. As the data traffic is expected to continuously strain the capacity of future communication networks, these networks need to evolve consistently in order to keep up with the growth of data traffic. Thus, more intelligent processing, operation, and optimization will be needed for tomorrow’s communication networks. The Sixth Generation (6G) technology is latest approach for mobile systems or edge devices in terms of reduce traffic congestions, energy consumption blending with IoT devices applications. The 6G network works beyond the 5G (B5G), where we can use various platforms as an application e.g. fog computing enabled IoT networks, Intelligent techniques for SDN network, 6G enabled healthcare industry, energy aware location management. Still this technology must resolve few challenges like security, IoT enabled trust network. This book will focus on the use of AI/ML-based techniques to solve issues related to 6G enabled networks, their layers, as well as their applications. It will be a collection of original contributions regarding state-of-the-art AI/ML-based solutions for signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction 6G enabled software-defined networking, congestion control, communication network optimization, security, and anomaly detection. The proposed edited book emphasis on the 6G network blended with Fog-IoT networks to introduce its applications and future perspectives that helps the researcher to apply this technique in their domain and it may also helpful to resolve the challenges and future opportunities with 6G networks.
This book is a collection of high-quality peer-reviewed research papers presented at International Conference on Recent Trends in Computing (ICRTC 2021) held at SRM Institute of Science and Technology, Ghaziabad, Delhi, India, during 4 – 5 June 2021. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. The book presents original works from researchers from academic and industry in the field of networking, security, big data and the Internet of things.
This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks. Its goal is to highlight major research directions and topics that are critical for those who are interested in maritime communication networks, equipping them to carry out further research in this field. The authors begin with a historical overview and address the marine business, emerging technologies, and the shortcomings of current network architectures (coverage, connectivity, reliability, etc.). In turn, they introduce a heterogeneous space/air/sea/ground maritime communication network architecture and investigate the transmission scheduling problem in maritime communication networks, together with solutions based on deep reinforcement learning. To accommodate the computation demands of maritime communication services, the authors propose a multi-vessel offloading algorithm for maritime mobile edge computing networks. In closing, they discuss the applications of swarm intelligence in maritime search and rescue.
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.