Jump to content

Main Page: Difference between revisions

From Edge Computing Wiki
No edit summary
No edit summary
 
(68 intermediate revisions by 18 users not shown)
Line 1: Line 1:
{red|Please note that you can only create or edit a page when you are on campus or connected to the UM VPN. }
Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we [http://www.edgecomputingbook.com/index.php/About (Click to See Who are We)] write together!


Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.


== Getting started ==
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]


== Structure of this WiKi ==
== Structure of this Textbook ==


1.[http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)
1. [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing Introduction to Edge Computing] (Vrunda Kadam, Aayush Chopra, and Riya Pawar)


1.1 What is Edge Computing?
1.1 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.1_What_is_Edge_Computing? What is Edge Computing?]


1.2 Why We Need Edge Computing?
1.2 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.2_Why_we_need_Edge_Computing? Why We Need Edge Computing?]


1.3 Edge Computing Application Domains and Typical Applications
1.3 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.3_Edge_Computing_application_Domains_and_Typical_Applications Edge Computing Application Domains and Typical Applications]


1.4 Different Edge Computing Paradigms (include Cloud-Edge Continuum here)
1.4 [http://www.edgecomputingbook.com/index.php/Introduction_to_Edge_Computing#1.4_Different_Edge_Computing_Paradigms Different Edge Computing Paradigms ]




2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)
2.[http://www.edgecomputingbook.com/index.php/User:Farhan#Edge_Computing_Architecture_and_Layers Edge Computing Architecture and Layers] (Amit Saha, Md Eleus, Farhan Tanvir)  


2.1 IoT, Mobile, and Digital Twins
2.1 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.1_IoT,_Mobile,_and_Digital_Twins IoT, Mobile, and Digital Twins]


2.2 Cloud
2.2 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.2_Cloud Cloud]


2.3 Edge and Fog  
2.3 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.3_Edge_and_Fog Edge and Fog


2.4 Edge-Cloud Continuum
2.4 [http://www.edgecomputingbook.com/index.php/User:Farhan#1.4_Edge-Cloud_Continuum Edge-Cloud Continuum




3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)
3.[http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks Edge Computing Products and Frameworks] (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)  


3.1 Industry Products: AWS as an Example
3.1 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.1_Industry_Products:_AWS_as_an_Example Industry Products: AWS as an Example]


3.2 Open Source Frameworks
3.2 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.2_Open_Source_Frameworks Open Source Frameworks]


3.3 Serverless at the Edge
3.3 [http://www.edgecomputingbook.com/index.php/Edge_Computing_Products_and_Frameworks#3.3_Serverless_at_the_Edge Serverless at the Edge]




4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)
4.[http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge Machine Learning at the Edge] (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)


4.1 Overview of ML at the Edge
4.1 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.1_Overview_of_ML_at_the_Edge Overview of ML at the Edge]


4.2 ML Training at the Edge
4.2 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.2_ML_Training_at_the_edge ML Training at the Edge]


4.3 ML Model Optimization for the Edge
4.3 [http://www.edgecomputingbook.com/index.php/Machine_Learning_at_the_Edge#4.3_ML_Model_Optimization_at_the_Edge ML Model Optimization at the Edge]




5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )
5. [http://www.edgecomputingbook.com/index.php/Federated_Learning Federated Learning] (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )


5.1 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.1_Overview_and_Motivation Overview & Motivation]


6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)
5.2 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.2_Federated_Learning_Architectures Federated Learning Architectures]


6.1 Overview of Security Challenges in Edge Computing
5.3 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.3_Aggregation_Algorithms_and_Communication_Efficiency Aggregation Algorithms & Communication]


6.2 Data Privacy and Compliance in Edge Applications
5.4 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.4_Privacy_Mechanisms Privacy Mechanisms]


6.3 Security Protocols and Frameworks for Edge Systems
5.5 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.5_Security_Threats Security Threats]


6.4 Case Studies: Real-World Security Breaches
5.6 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.6_Resource-Efficient_Model_Training Resource-Efficient Model Training]


5.7 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_Real-World_Use_Cases Real-World Use Cases]


7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
5.8 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.8_Open_Challenges Open Challenges]


7.1  Task and Resource Scheduling
5.9 [http://www.edgecomputingbook.com/index.php/Federated_Learning#5.7_References References]


7.2  Edge for AR/VR


7.3  Vehicle Computing
6.[http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy Edge Security and Privacy] (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)


7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)
6.1 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.1_Overview_of_Security_Challenges_in_Edge_Computing Overview of Security Challenges in Edge Computing]


7.5 Data persistence (Warren Lazarraga)
6.2 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.2_Data_Privacy_and_Compliance_in_Edge_Applications Data Privacy and Compliance in Edge Applications]


8.Conclusion and Future Outlook (cannot be chosen by students)
6.3 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.3_Security_Protocols_and_Frameworks_for_Edge_Systems Security Protocols and Frameworks for Edge Systems]
 
6.4 [http://www.edgecomputingbook.com/index.php/Chapter_6:_Edge_Security_and_Privacy#6.4_Case_Studies:_Real-World_Security_Breaches Case Studies: Real-World Security Breaches]
 
 
7. [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions Emerging Research Directions] (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)
 
7.1  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.1_Task_and_Resource_Scheduling Task and Resource Scheduling]
 
7.2  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.2_Edge_for_AR/VR Edge for AR/VR]
 
7.3  [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.3_Vehicle_Computing Vehicle Computing]
 
7.4 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.4_Energy-Efficient_Edge_Architectures Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)]
 
7.5 [http://www.edgecomputingbook.com/index.php/Emerging_Research_Directions#7.5_Data_Persistence Data Persistence (Warren Lazarraga)]
 
 
8. [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing Applications of Edge Computing: Underwater Internet of Things (UIoT)]
 
8.1 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.1_Introduction_to_UIoT_and_AUVs Introduction to UIoT and AUVs]
 
8.2 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.2_Edge_Computing_for_AUVs:_Benefits_and_Necessity Edge Computing for AUVs: Benefits and Necessity]
 
8.3 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.3_Challenges_of_Using_Edge_Computing_with_AUVs Key Challenges in Applying Edge Computing to AUVs]
 
8.4 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.4_State-of-the-Art_Edge_Computing_Solutions State-of-the-Art Edge Computing Solutions]
 
8.5 [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#8.5_Future_Research_Directions_(Work_in_progress) Future Research Directions]
 
: [http://www.edgecomputingbook.com/index.php/Applications_of_Edge_Computing#References References]
 
 
9.[http://www.edgecomputingbook.com/index.php/Conclusion Conclusion and Future Outlook]

Latest revision as of 16:15, 21 April 2025

Welcome to our Edge Computing Wiki! We are students and faculty in CIS@UMDearborn taking this course at Winter 2025. This is the textbook we (Click to See Who are We) write together!


Structure of this Textbook[edit]

1. Introduction to Edge Computing (Vrunda Kadam, Aayush Chopra, and Riya Pawar)

1.1 What is Edge Computing?

1.2 Why We Need Edge Computing?

1.3 Edge Computing Application Domains and Typical Applications

1.4 Different Edge Computing Paradigms


2.Edge Computing Architecture and Layers (Amit Saha, Md Eleus, Farhan Tanvir)

2.1 IoT, Mobile, and Digital Twins

2.2 Cloud

2.3 Edge and Fog

2.4 Edge-Cloud Continuum


3.Edge Computing Products and Frameworks (Ashwin Alinkil, Jasmine Rabie, Nate Pierce, Brian Retterer)

3.1 Industry Products: AWS as an Example

3.2 Open Source Frameworks

3.3 Serverless at the Edge


4.Machine Learning at the Edge (Vlad Nitu, Joel Henry Arun, Ciaran Grabowski, and Haneen Syed)

4.1 Overview of ML at the Edge

4.2 ML Training at the Edge

4.3 ML Model Optimization at the Edge


5. Federated Learning (Manoj Alexander, Ram Kumar Ippili, Sai Revanth Iddum, and Chakradhar Nidujuvvi )

5.1 Overview & Motivation

5.2 Federated Learning Architectures

5.3 Aggregation Algorithms & Communication

5.4 Privacy Mechanisms

5.5 Security Threats

5.6 Resource-Efficient Model Training

5.7 Real-World Use Cases

5.8 Open Challenges

5.9 References


6.Edge Security and Privacy (Nitin Madhu, Ali Siddiqi, Jyotsana Sharma, Vedant Patel)

6.1 Overview of Security Challenges in Edge Computing

6.2 Data Privacy and Compliance in Edge Applications

6.3 Security Protocols and Frameworks for Edge Systems

6.4 Case Studies: Real-World Security Breaches


7. Emerging Research Directions (7.1~7.3: Erika Valle-Baird, Mohamed Aboulsaad, Matthew Kwan)

7.1 Task and Resource Scheduling

7.2 Edge for AR/VR

7.3 Vehicle Computing

7.4 Energy-Efficient Edge Architectures (Zaid Ghazal, Matthew Correa)

7.5 Data Persistence (Warren Lazarraga)


8. Applications of Edge Computing: Underwater Internet of Things (UIoT)

8.1 Introduction to UIoT and AUVs

8.2 Edge Computing for AUVs: Benefits and Necessity

8.3 Key Challenges in Applying Edge Computing to AUVs

8.4 State-of-the-Art Edge Computing Solutions

8.5 Future Research Directions

References


9.Conclusion and Future Outlook