2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) 2017
DOI: 10.1109/icdcsw.2017.61
|View full text |Cite
|
Sign up to set email alerts
|

Router-Based Brokering for Surrogate Discovery in Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…21 This can be extended to a distributed hash table (DHT) as well, for notifying arrival and departure and for scheduling tasks. 75 Some also suggest a hierarchical discovery approach for edges partitioned into fog parents, and fogs themselves reporting to higher-level fogs, all of which is accumulated at a discovery server. 76 Some also use the transport-level protocols, 77 eg, by having a leader device to broadcast an 802.11 WiFi beacon frame to notify spatially proximate devices that wish to join about the location of the leader to contact.…”
Section: Figurementioning
confidence: 99%
“…21 This can be extended to a distributed hash table (DHT) as well, for notifying arrival and departure and for scheduling tasks. 75 Some also suggest a hierarchical discovery approach for edges partitioned into fog parents, and fogs themselves reporting to higher-level fogs, all of which is accumulated at a discovery server. 76 Some also use the transport-level protocols, 77 eg, by having a leader device to broadcast an 802.11 WiFi beacon frame to notify spatially proximate devices that wish to join about the location of the leader to contact.…”
Section: Figurementioning
confidence: 99%
“…Hence, it is not uncommon for requests to be directed to distant data centers. Many works have presented empirical measurements of network latencies and motivated edge computing based on those numbers [4], [12], [50]. For instance, in [12] the authors measure the mean round-trip times between New York and Berkeley to be 85 ms.…”
Section: A Promises Benefits and Drawbacks Of Edge Computingmentioning
confidence: 99%
“…To connect to wireless gateways, client devices use different access technologies. The most common are WiFi [50] or cellular [78] connections. In this domain, we can observe development in two aspects: (i) new communication standards emerge.…”
Section: B Access Technologies and Communication Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Conventional addressing schemes are not suited to match the service-centric nature of the targeted context. Discovery procedures are typically performed with the help of an application-layer broker mechanism [32,33] that matches the service request with the best available node that is able to execute the service based on specified requirements and discovered capabilities. These broker entities, however, further complicate the reference scenario.…”
Section: Fog Computing: Key Pillars and Issuesmentioning
confidence: 99%