Introduction ix Chapter 1. Edge Architectures 1 1.1. The three levels of Edge Networking 1 1.2. Edge Computing architectures 4 1.3. Security and domain name system on Edge 14 1.
4. The digital infrastructure of the participatory Internet 16 1.5. Conclusion 17 1.6. References 18 Chapter 2. MEC Networks 21 2.1.
The MEC level of 5G architecture 21 2.2. 5G 25 2.3. 5G Edge 29 2.4. Conclusion 37 2.5.
References 37 Chapter 3. Fog Networks 39 3.1. Fog architectures 39 3.2. Fog controllers 44 3.3. Fog and the Internet of Things 48 3.
4. Wi-Fi in the Fog''s digital infrastructure 50 3.5. The new generation Wi-Fi 54 3.6. The next generation of mobile Wi-Fi 63 3.7. Private 5G for Fog Networking 64 3.
8. Conclusion 69 3.9. References 69 Chapter 4. Skin Networks 73 4.1. The architecture of Skin networks 73 4.2.
Virtual access points 74 4.3. Participatory Internet networks 77 4.4. Conclusion 82 4.5. References 83 Chapter 5. Ad hoc and Mesh Networks 85 5.
1. Ad hoc networks 85 5.2. Routing 88 5.3. Mesh networks 93 5.4. Participatory networks 95 5.
5. Local services 96 5.6. The digital infrastructure of the Internet of the Edges 97 5.7. Conclusion 101 5.8. References 102 Chapter 6.
Applications of the Internet of Edges 105 6.1. Civil security and defense applications 107 6.2. Applications of the Internet of Things 108 6.3. The tactile Internet. 110 6.
4. Telecom applications 115 6.5. Industry 4.0 116 6.6. The smart city 118 6.7.
Conclusion 121 6.8. References 121 Chapter 7. Vehicular Networks 123 7.1. Communication techniques for vehicular networks 123 7.2. Vehicular Ad hoc NETworks 126 7.
3. Connected and intelligent vehicles 127 7.4. The MEC and the VEC 128 7.5. Intelligent transport systems (ITS)-G5 130 7.6. 5G V2X 133 7.
7. The VLC 139 7.8. Conclusion 140 7.9. References 140 Chapter 8. Virtualization of the Internet of Edges 143 8.1.
Network virtualization 143 8.2. Virtualization on the Edge 145 8.3. Using virtual networks on the Edge 151 8.3.1. Isolation 152 8.
3.2. Extending network virtualization 153 8.4. Mobile Edge Computing 155 8.4.1. Examples of MEC applications 155 8.
4.2. Geolocation 156 8.4.3. Augmented reality 156 8.4.4.
Video analytics 157 8.4.5. Content optimization 158 8.4.6. Content cache and DNS cache 158 8.4.
7. Performance optimization 159 8.4.8. Positioning of MEC servers 159 8.5. Conclusion 162 8.6.
References 162 Chapter 9. Security 165 9.1. Cloud of security on the Edge 165 9.2. Secure element 170 9.2.1.
Security based on secure elements 174 9.2.2. The TEE 175 9.2.3. The trusted service manager 176 9.2.
4. The Cloud-based security solution 177 9.2.5. Solutions for security 178 9.3. Blockchain 183 9.3.
1. Blockchain consensus 184 9.3.2. Blockchain in Edge Computing. 185 9.4. Conclusion 188 9.
5. References 188 Chapter 10. The Example of Green Communications 193 10.1. The Green PI solution 194 10.2. The Edge Cloud 194 10.3.
The IoE 195 10.4. The IoE platform 199 10.5. Use cases: IoT in constrained environments 201 10.6. IoT in motion 202 10.7.
Massive IoT 203 10.8. The advantages 205 10.9. References 205 Chapter 11. Deployment of the Participatory Internet 207 11.1. The deployment 207 11.
2. The Green Cloud 208 11.2.1. My Network 211 11.2.2. Chat 212 11.
2.3. Talk 212 11.2.4. Storage 212 11.2.5.
vCard Editor 212 11.3. Scaling up 212 11.4. Energy savings 214 11.5. Security 219 11.6.
Wi-Fi and LTE hybridization 220 11.7. Conclusion 223 11.8. References 223 Chapter 12. The Future 225 12.1. The short-term future 225 12.
2. The medium-term future 226 12.3. The long-term future 227 12.4. Participatory Internet and IPV6 228 12.5. References 231 List of Authors 235 Index 237.