Jump to content

Main Page: Difference between revisions

From Edge Computing Wiki
No edit summary
 
(79 intermediate revisions by 18 users not shown)
Line 1: Line 1:
<strong>MediaWiki has been installed.</strong>
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we [http://www.edgecomputingbook.com/index.php/About (Click to See Who are We)] write together!


Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.


== Getting started ==
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]
* [http://141.215.80.239/index.php/Structure structure of the book]


== Structure of this WiKi ==
== Structure of this Textbook ==
1.Introduction.


1.1 What is Edge Computing?
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)


1.2 Why We Need Edge Computing?
1.1 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.1_What_is_Edge_Computing? What is Edge Computing?]


1.3 Edge Computing Application Domains and Typical Applications
1.2 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.2_Why_we_need_Edge_Computing? Why We Need Edge Computing?]


1.4 Different Edge Computing Paradigms (include Cloud-Edge Continuum here)
1.3 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.3_Edge_Computing_application_Domains_and_Typical_Applications Edge Computing Application Domains and Typical Applications]


1.4 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.4_Different_Edge_Computing_Paradigms Different Edge Computing Paradigms ]


2.Edge Computing Architecture and Layers


2.1 IoT, Mobile, and Digital Twins
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers] (Amit Saha, Md Eleus, Farhan Tanvir)


2.2 Cloud
2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins]


2.3 Edge and Fog
2.2 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.2_Cloud Cloud]


2.4 Edge-Cloud Continuum
2.3 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.3_Edge_and_Fog Edge and Fog] 


2.4 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.4_Edge-Cloud_Continuum Edge-Cloud Continuum] 


3.Edge Computing Products and Frameworks


3.1 Industry Products: AWS as an Example
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks] (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)


3.2 Open Source Frameworks
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example]


3.3 Serverless at the Edge
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks]


3.3 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.3_Serverless_at_the_Edge Serverless at the Edge]


4.Machine Learning at the Edge


4.1 Overview of ML at the Edge
4.[http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge Machine Learning at the Edge] (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)


4.2 ML Training at the Edge
4.1 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.1_Overview_of_ML_at_the_Edge Overview of ML at the Edge]


4.3 ML Model Optimization for the Edge
4.2 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.2_ML_Training_at_the_edge ML Training at the Edge]


4.4 Federated Learning
4.3 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.3_ML_Model_Optimization_at_the_Edge ML Model Optimization at the Edge]




5.Edge Security and Privacy
5. [http://www.edgecomputingbook.com/index.php/Federated_Learning Federated Learning] (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )


5.1 Overview of Security Challenges in Edge Computing
5.1 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.1_Overview_and_Motivation Overview & Motivation]


5.2 Data Privacy and Compliance in Edge Applications
5.2 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.2_Federated_Learning_Architectures Federated Learning Architectures]


5.3 Security Protocols and Frameworks for Edge Systems
5.3 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.3_Aggregation_Algorithms_and_Communication_Efficiency Aggregation Algorithms & Communication]


5.4 Case Studies: Real-World Security Breaches
5.4 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.4_Privacy_Mechanisms Privacy Mechanisms]


5.5 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.5_Security_Threats Security Threats]


6. Emerging Research Directions
5.6 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.6_Resource-Efficient_Model_Training Resource-Efficient Model Training]


6.1  Task and Resource Scheduling
5.7 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_Real-World_Use_Cases Real-World Use Cases]


6.2  Edge for AR/VR
5.8 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.8_Open_Challenges Open Challenges]


6.3  Vehicle Computing
5.9 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_References References]


6.4 Energy-Efficient Edge Architectures


6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)


7.Conclusion and Future Outlook (cannot be chosen by students)
6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing]
 
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications]
 
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems]
 
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches]
 
 
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions] (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
 
7.1  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling]
 
7.2  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.2_Edge_for_AR/VR Edge for AR/VR]
 
7.3  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.3_Vehicle_Computing Vehicle Computing]
 
7.4 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.4_Energy-Efficient_Edge_Architectures Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)]
 
7.5 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.5_Data_Persistence Data Persistence (Warren Lazarraga)]
 
 
8. [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing Applications of Edge Computing: Underwater Internet of Things (UIoT)]
 
8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs]
 
8.2 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.2_Edge_Computing_for_AUVs:_Benefits_and_Necessity Edge Computing for AUVs: Benefits and Necessity]
 
8.3 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.3_Challenges_of_Using_Edge_Computing_with_AUVs Key Challenges in Applying Edge Computing to AUVs]
 
8.4 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.4_State-of-the-Art_Edge_Computing_Solutions State-of-the-Art Edge Computing Solutions]
 
8.5 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.5_Future_Research_Directions_(Work_in_progress) Future Research Directions]
 
: [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#References References]
 
 
9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook]

Latest revision as of 16:15, 21 April 2025

Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we (Click to See Who are We) write together!


Structure of this Textbook[edit]

1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)

1.1 What is Edge Computing?

1.2 Why We Need Edge Computing?

1.3 Edge Computing Application Domains and Typical Applications

1.4 Different Edge Computing Paradigms


2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)

2.1 IoT, Mobile, and Digital Twins

2.2 Cloud

2.3 Edge and Fog

2.4 Edge-Cloud Continuum


3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)

3.1 Industry Products: AWS as an Example

3.2 Open Source Frameworks

3.3 Serverless at the Edge


4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)

4.1 Overview of ML at the Edge

4.2 ML Training at the Edge

4.3 ML Model Optimization at the Edge


5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )

5.1 Overview & Motivation

5.2 Federated Learning Architectures

5.3 Aggregation Algorithms & Communication

5.4 Privacy Mechanisms

5.5 Security Threats

5.6 Resource-Efficient Model Training

5.7 Real-World Use Cases

5.8 Open Challenges

5.9 References


6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)

6.1 Overview of Security Challenges in Edge Computing

6.2 Data Privacy and Compliance in Edge Applications

6.3 Security Protocols and Frameworks for Edge Systems

6.4 Case Studies: Real-World Security Breaches


7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)

7.1 Task and Resource Scheduling

7.2 Edge for AR/VR

7.3 Vehicle Computing

7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)

7.5 Data Persistence (Warren Lazarraga)


8. Applications of Edge Computing: Underwater Internet of Things (UIoT)

8.1 Introduction to UIoT and AUVs

8.2 Edge Computing for AUVs: Benefits and Necessity

8.3 Key Challenges in Applying Edge Computing to AUVs

8.4 State-of-the-Art Edge Computing Solutions

8.5 Future Research Directions

References


9.Conclusion and Future Outlook