Prof. Gerhard Fohler
Stephanie Jung
Phone: +49 631 205 2086

Office Hours
Mon/Tue: 13:00-16:00
Wed-Fri: 08:00-11:00
You are here: RTS-Portal>>Publications


Search Publications


Edge Computing with Peer to Peer Interactions: Use Cases and Impact

Category: Inproceedings
Author(s)Vasileios Karagiannis, Alexandre Venito, Rodrigo Coelho, Michael Borkowski, Gerhard Fohler
SourceWorkshop on Fog Computing and the Internet of Things (Fog-IoT 2019), co-located with CPS-IoT Week 2019.
Date Apr 2019


Edge and fog computing applications typically focus on outsourcing computations from static or mobile end user devices towards compute nodes in proximity. However, such applications do not fully exploit the benefits of the edge because the resources of neighboring end user devices are not considered as potential compute nodes. For this reason, we propose complementing edge computing with peer to peer interactions in order to enable the end user devices to communicate with each other and share computations. Peer to peer is a well established communication model that can be used for organizing the available resources based on proximity disregarding their role in the network (i.e., end user device, edge or cloud node). This way, all resources become accessible and computations may be outsourced towards any node. In this paper, we present three edge computing use cases that can benefit from the use of peer to peer, namely: suspect identification/finding lost children, augmented reality applied in tourism and sightseeing and warehouse communication for online shopping. We further motivate the use of peer to peer by analyzing the compatibility with edge computing and the potential impact, and we identify related research challenges.


Upcoming Events
Currently no events
Latest News:
09.04.20 16:47
Dear students, things will run differently this semester, we are figuring out how we can...

31.01.20 10:29
Prof.Marcello Cinque, University of Naples Federico II, will be visiting and giving a number of...

31.07.19 10:29
Our paper titled "Minimizing Side-Channel Attack Vulnerability via Schedule...

All News