2017
DOI: 10.1109/mcom.2017.7901470
|View full text |Cite
|
Sign up to set email alerts
|

Clarifying Fog Computing and Networking: 10 Questions and Answers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0
3

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 209 publications
(101 citation statements)
references
References 0 publications
0
88
0
3
Order By: Relevance
“…Among directions for future work, we mention here the analysis of more general caching strategies that allow for coding and arbitrary caching patterns across files and ENs; of the impact of imperfect CSI; of partial connectivity (see [28] and references therein); and of more realistic request models [22]; as well as the investigation of online caching within large fog architectures including metro and core segments [29].…”
Section: Discussionmentioning
confidence: 99%
“…Among directions for future work, we mention here the analysis of more general caching strategies that allow for coding and arbitrary caching patterns across files and ENs; of the impact of imperfect CSI; of partial connectivity (see [28] and references therein); and of more realistic request models [22]; as well as the investigation of online caching within large fog architectures including metro and core segments [29].…”
Section: Discussionmentioning
confidence: 99%
“…They introduce various applications that benefit from fog and present several challenges. More recently, Chiang et al [18] provide a tutorial on fog computing. They discuss at a very high level the differences between fog computing, edge computing, and cloud computing.…”
Section: A Existing Surveys and Tutorials On Fog Computingmentioning
confidence: 99%
“…Table VIII provides a summary of these challenges and research directions, the relevant works from the literature, and potential solutions and starting points. 18 snia.org/cdmi This paper has been accepted for publication in IEEE Communications Surveys & Tutorials. The content is final but has NOT been proof-read.…”
Section: B Algorithmic Challenges and Research Directionsmentioning
confidence: 99%
“…Chiang et al [43] define fog computing as an "end-to-end horizontal architecture" for the IoT that distributes the compute and storage, control and communication planes nearer to users "along the cloud-to-thing continuum". Aazam and Huh [1] describe specifically how this vision can be realised in terms of additional security, storage, processing and monitoring sub-layers between the physical layer and the transport layer of an IoT architecture.…”
Section: Data Collection: Discovery Management Transmission Contexmentioning
confidence: 99%