Jump to content

Main Page: Difference between revisions

From Edge Computing Wiki
Aayush (talk | contribs)
m add link to respective content
No edit summary
 
(54 intermediate revisions by 13 users not shown)
Line 1: Line 1:
<span style="color: red;"> Please note that: </span>
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we [http://www.edgecomputingbook.com/index.php/About (Click to See Who are We)] write together!
* you can only create or edit a page when you are on campus or connected to the UM VPN.
* read this help page for formatting:  [https://www.mediawiki.org/wiki/Help:Formatting Formatting]
* read this help page for user's guide: [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide]




Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.


== Getting started ==
== Structure of this Textbook ==
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]
 
== Structure of this WiKi ==
 
1. [http://www.edgecomputingbook.com/index.php/Edge_Cloud:_Bringing_Computing_Close_to_the_User Edge Cloud Demo] - Sample
 
2. [http://www.edgecomputingbook.com/index.php/Chapter_1:_Edge_Computing Edge Computing Chapter 1] -  Reference Sample


1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
Line 31: Line 16:




2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers] (Amit Saha, Md Eleus, Farhan Tanvir)  


2.1 IoT, Mobile, and Digital Twins
2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins]


2.2 Cloud
2.2 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.2_Cloud Cloud]


2.3 Edge and Fog  
2.3 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.3_Edge_and_Fog Edge and Fog


2.4 Edge-Cloud Continuum
2.4 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.4_Edge-Cloud_Continuum Edge-Cloud Continuum




3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)]
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks] (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)  


3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example]
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example]
Line 48: Line 33:
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks]
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks]


3.3 Serverless at the Edge
3.3 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.3_Serverless_at_the_Edge Serverless at the Edge]
 
 
4.[http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge Machine Learning at the Edge] (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
 
4.1 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.1_Overview_of_ML_at_the_Edge Overview of ML at the Edge]
 
4.2 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.2_ML_Training_at_the_edge ML Training at the Edge]
 
4.3 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.3_ML_Model_Optimization_at_the_Edge ML Model Optimization at the Edge]
 
 
5. [http://www.edgecomputingbook.com/index.php/Federated_Learning Federated Learning] (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
 
5.1 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.1_Overview_and_Motivation Overview & Motivation]
 
5.2 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.2_Federated_Learning_Architectures Federated Learning Architectures]
 
5.3 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.3_Aggregation_Algorithms_and_Communication_Efficiency Aggregation Algorithms & Communication]
 
5.4 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.4_Privacy_Mechanisms Privacy Mechanisms]
 
5.5 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.5_Security_Threats Security Threats]
 
5.6 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.6_Resource-Efficient_Model_Training Resource-Efficient Model Training]
 
5.7 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_Real-World_Use_Cases Real-World Use Cases]
 
5.8 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.8_Open_Challenges Open Challenges]
 
5.9 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_References References]
 
 
6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)


6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing]


4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications]


4.1 Overview of ML at the Edge
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems]


4.2 ML Training at the Edge
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches]


4.3 ML Model Optimization for the Edge


7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions] (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)


5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
7.1  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling]


7.2  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.2_Edge_for_AR/VR Edge for AR/VR]


6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
7.3  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.3_Vehicle_Computing Vehicle Computing]


6.1 Overview of Security Challenges in Edge Computing
7.4 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.4_Energy-Efficient_Edge_Architectures Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)]


6.2 Data Privacy and Compliance in Edge Applications
7.5 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.5_Data_Persistence Data Persistence (Warren Lazarraga)]


6.3 Security Protocols and Frameworks for Edge Systems


6.4 Case Studies: Real-World Security Breaches
8. [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing Applications of Edge Computing: Underwater Internet of Things (UIoT)]


8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs]


7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
8.2 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.2_Edge_Computing_for_AUVs:_Benefits_and_Necessity Edge Computing for AUVs: Benefits and Necessity]


7.1  Task and Resource Scheduling
8.3 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.3_Challenges_of_Using_Edge_Computing_with_AUVs Key Challenges in Applying Edge Computing to AUVs]


7.Edge for AR/VR
8.4 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.4_State-of-the-Art_Edge_Computing_Solutions State-of-the-Art Edge Computing Solutions]


7.3  Vehicle Computing
8.5 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.5_Future_Research_Directions_(Work_in_progress) Future Research Directions]


7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
: [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#References References]


7.5 Data persistence (Warren Lazarraga)


8.Conclusion and Future Outlook (cannot be chosen by students)
9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook]

Latest revision as of 16:15, 21 April 2025

Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we (Click to See Who are We) write together!


Structure of this Textbook[edit]

1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)

1.1 What is Edge Computing?

1.2 Why We Need Edge Computing?

1.3 Edge Computing Application Domains and Typical Applications

1.4 Different Edge Computing Paradigms


2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)

2.1 IoT, Mobile, and Digital Twins

2.2 Cloud

2.3 Edge and Fog

2.4 Edge-Cloud Continuum


3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)

3.1 Industry Products: AWS as an Example

3.2 Open Source Frameworks

3.3 Serverless at the Edge


4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)

4.1 Overview of ML at the Edge

4.2 ML Training at the Edge

4.3 ML Model Optimization at the Edge


5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )

5.1 Overview & Motivation

5.2 Federated Learning Architectures

5.3 Aggregation Algorithms & Communication

5.4 Privacy Mechanisms

5.5 Security Threats

5.6 Resource-Efficient Model Training

5.7 Real-World Use Cases

5.8 Open Challenges

5.9 References


6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)

6.1 Overview of Security Challenges in Edge Computing

6.2 Data Privacy and Compliance in Edge Applications

6.3 Security Protocols and Frameworks for Edge Systems

6.4 Case Studies: Real-World Security Breaches


7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)

7.1 Task and Resource Scheduling

7.2 Edge for AR/VR

7.3 Vehicle Computing

7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)

7.5 Data Persistence (Warren Lazarraga)


8. Applications of Edge Computing: Underwater Internet of Things (UIoT)

8.1 Introduction to UIoT and AUVs

8.2 Edge Computing for AUVs: Benefits and Necessity

8.3 Key Challenges in Applying Edge Computing to AUVs

8.4 State-of-the-Art Edge Computing Solutions

8.5 Future Research Directions

References


9.Conclusion and Future Outlook