Introduction ix
Chapter 1. Edge Architectures 1
1.1. The three levels of Edge Networking 1
1.2. Edge Computing architectures 4
1.3. Security and domain name system on Edge 14
1.4. The digital infrastructure of the participatory Internet 16
1.5. Conclusion 17
1.6. References 18
Chapter 2. MEC Networks 21
2.1. The MEC level of 5G architecture 21
2.2. 5G 25
2.3. 5G Edge 29
2.4. Conclusion 37
2.5. References 37
Chapter 3. Fog Networks 39
3.1. Fog architectures 39
3.2. Fog controllers 44
3.3. Fog and the Internet of Things 48
3.4. Wi-Fi in the Fog's digital infrastructure 50
3.5. The new generation Wi-Fi 54
3.6. The next generation of mobile Wi-Fi 63
3.7. Private 5G for Fog Networking 64
3.8. Conclusion 69
3.9. References 69
Chapter 4. Skin Networks 73
4.1. The architecture of Skin networks 73
4.2. Virtual access points 74
4.3. Participatory Internet networks 77
4.4. Conclusion 82
4.5. References 83
Chapter 5. Ad hoc and Mesh Networks 85
5.1. Ad hoc networks 85
5.2. Routing 88
5.3. Mesh networks 93
5.4. Participatory networks 95
5.5. Local services 96
5.6. The digital infrastructure of the Internet of the Edges 97
5.7. Conclusion 101
5.8. References 102
Chapter 6. Applications of the Internet of Edges 105
6.1. Civil security and defense applications 107
6.2. Applications of the Internet of Things 108
6.3. The tactile Internet. 110
6.4. Telecom applications 115
6.5. Industry 4.0 116
6.6. The smart city 118
6.7. Conclusion 121
6.8. References 121
Chapter 7. Vehicular Networks 123
7.1. Communication techniques for vehicular networks 123
7.2. Vehicular Ad hoc NETworks 126
7.3. Connected and intelligent vehicles 127
7.4. The MEC and the VEC 128
7.5. Intelligent transport systems (ITS)-G5 130
7.6. 5G V2X 133
7.7. The VLC 139
7.8. Conclusion 140
7.9. References 140
Chapter 8. Virtualization of the Internet of Edges 143
8.1. Network virtualization 143
8.2. Virtualization on the Edge 145
8.3. Using virtual networks on the Edge 151
8.3.1. Isolation 152
8.3.2. Extending network virtualization 153
8.4. Mobile Edge Computing 155
8.4.1. Examples of MEC applications 155
8.4.2. Geolocation 156
8.4.3. Augmented reality 156
8.4.4. Video analytics 157
8.4.5. Content optimization 158
8.4.6. Content cache and DNS cache 158
8.4.7. Performance optimization 159
8.4.8. Positioning of MEC servers 159
8.5. Conclusion 162
8.6. References 162
Chapter 9. Security 165
9.1. Cloud of security on the Edge 165
9.2. Secure element 170
9.2.1. Security based on secure elements 174
9.2.2. The TEE 175
9.2.3. The trusted service manager 176
9.2.4. The Cloud-based security solution 177
9.2.5. Solutions for security 178
9.3. Blockchain 183
9.3.1. Blockchain consensus 184
9.3.2. Blockchain in Edge Computing. 185
9.4. Conclusion 188
9.5. References 188
Chapter 10. The Example of Green Communications 193
10.1. The Green PI solution 194
10.2. The Edge Cloud 194
10.3. The IoE 195
10.4. The IoE platform 199
10.5. Use cases: IoT in constrained environments 201
10.6. IoT in motion 202
10.7. Massive IoT 203
10.8. The advantages 205
10.9. References 205
Chapter 11. Deployment of the Participatory Internet 207
11.1. The deployment 207
11.2. The Green Cloud 208
11.2.1. My Network 211
11.2.2. Chat 212
11.2.3. Talk 212
11.2.4. Storage 212
11.2.5. vCard Editor 212
11.3. Scaling up 212
11.4. Energy savings 214
11.5. Security 219
11.6. Wi-Fi and LTE hybridization 220
11.7. Conclusion 223
11.8. References 223
Chapter 12. The Future 225
12.1. The short-term future 225
12.2. The medium-term future 226
12.3. The long-term future 227
12.4. Participatory Internet and IPV6 228
12.5. References 231
List of Authors 235
Index 237