Skip to main content

A Peek at the Future Internet

  • Chapter
  • First Online:
Networks for Pervasive Services

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 92))

Abstract

The Internet “connectivity machine” is the generative engine of our modern digital society. It has been the launching pad of the Web (now the Web 2.0), truly the largest and most versatile information system ever built. While the Web phenomenon relentlessly continues, scientists worldwide are now living the dream of yet a more generative next-generation network. This chapter explores some prominent research directions, discussing the Internet of Things, context-aware networks, small world networks, scale-free networks, autonomic networks, dependable networks, the privacy vs. security dichotomy and the two facets of energy-efficient networks.

The best way to predict the future is to invent it

Alan Key, computer scientist

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Autonomic networks are envisioned to be able to self-configure, self-heal, self-optimize and self-protect with minimal human intervention, according to the autonomic computing principles.

  2. 2.

    Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object for the purpose of identification and tracking.

  3. 3.

    Recent literature describing the properties and mechanisms of small-world and scale-free networks is included in our “References” section.

  4. 4.

    A link is “weak” when its addition or removal does not significantly change the mean value of a target measure (P. Csermely, “Weak Links”, Springer 2009).

  5. 5.

    A.E. Motter, Cascade control and defense in complex networks. Phys Rev Lett 93, 098701.

  6. 6.

    Nestedness indicates the hierarchical structure of networks. Each element of the top network usually consists of an entire network of elements at the lower level. Nestedness helps us to explain the complexity of networks.

  7. 7.

    Hubs are connection-rich network elements.

  8. 8.

    In hierarchical networks, the inner core becomes a rich club if it is formed by the hubs of the network. For example, in the Internet, the routers form rich clubs.

  9. 9.

    In VIP clubs, the most influential members have low number of connections. However, many of these connections lead to hubs.

  10. 10.

    Optical buffering is currently one of the major hurdles in the realization of all-optical networks, which would lead to a substantial increase in network capacity.

  11. 11.

    C. Bianco, F. Cucchietti, and G. Gri, “Energy consumption trends in the next generation access network—a telco perspective,” International Telecommunications Energy Conference, INTELEC, Sep. 30–Oct. 4, Rome, Italy, 2007.

  12. 12.

    Source The Economist, 8–14 January 2011.

  13. 13.

    Source http://148apps.biz/app-store-metrics/

  14. 14.

    As of January 2011, the number of android devices has surpassed the number of iPhones. However, the number of iPhone apps is significantly larger.

References

  1. Chaouchi H (2010) The internet of things: connecting objects. Wiley-ISTE

    Google Scholar 

  2. Kim S, Choi M, Ju H, Ejiri M, Hong J (2008) Towards management requirements of future internet. Challenges for next generation network operations and service management. Springer, pp 156–166

    Google Scholar 

  3. Liotta A, Liotta A (2008) P2P in a regulated environment: challenges and opportunities for the operator. BT Technol J 26:150–157

    Google Scholar 

  4. Akyildiz IF, Vuran MC (2010) Wireless sensor networks. Wiley

    Google Scholar 

  5. Farooq M (2010) Bee-inspired protocol engineering: from nature to networks. Springer, Heidelberg

    Google Scholar 

  6. Haykin S (2008) Neural networks and learning machines. Prentice Hall, New Jersey

    Google Scholar 

  7. XiaoFan W, Guanrong C (2003) Complex networks: small-world, scale-free and beyond. IEEE Circuits Syst Mag 3:6–20

    Article  Google Scholar 

  8. Dressler F, Akan O (2010) Bio-inspired networking: from theory to practice. IEEE Commun Mag 48:176–183

    Article  Google Scholar 

  9. Buchanan M (2003) Nexus: small worlds and the groundbreaking theory of networks. W.W. Norton & Company

    Google Scholar 

  10. Gammon K (2010) Four ways to reinvent the Internet. doi:10.1038/463602a

  11. Clark DD, Partridge C, Braden RT, Davie B, Floyd S, Jacobson V, Katabi D, Minshall G, Ramakrishnan KK, Roscoe T, Stoica I, Wroclawski J, Zhang L (2005) Making the world (of communications) a different place. SIGCOMM Comput Commun Rev 35:91–96

    Article  Google Scholar 

  12. Csermely P (2009) Weak links: the universal key to the stability of networks and complex systems. Springer

    Google Scholar 

  13. Dhillon S (2008) Ant routing, searching and topology estimation algorithms for ad hoc networks. Delft University Press

    Google Scholar 

  14. Papadimitriou D (ed) (2009) Future internet—the cross-ETP vision document, v. 1.0. http://www.futureinternet.eu

  15. Jennings B, van der Meer S, Balasubramaniam S, Botvich D, Foghlu M, Donnelly W, Strassner J (2007) Towards autonomic management of communications networks. IEEE Commun Mag 45:112–121

    Article  Google Scholar 

  16. Agboma F, Liotta A (2010) Quality of experience management in mobile content delivery systems. J Telecommun Syst (Spacial issue on the Quality of Experience issues in Multimedia Provision, 14 pages, Springer; Online First, 24 June 2010). doi:10.1007/s11235-010-9355-6

  17. Menkovski V, Exarchakos G, Liotta A, Sánchez AC (2010) Quality of experience models for multimedia streaming. Int J Mobile Comput Multimedia Commun (IJMCMC) 2(4):1–20. doi:10.4018/jmcmc.2010100101

    Article  Google Scholar 

  18. Handley M (2006) Why the Internet only just works. BT Technol J 24:119–129

    Article  Google Scholar 

  19. Alhaisoni M, Liotta A (2009) Characterization of signaling and traffic in Joost. Peer-to-peer Netw Appl 2:75–83

    Article  Google Scholar 

  20. Alhaisoni M, Liotta A, Ghanbari M (2009) Improving P2P streaming methods for IPTV. Int J Adv Intell Syst 2:354–365

    Google Scholar 

  21. Alhaisoni M, Ghanbari M, Liotta A (2010) Scalable P2P video streaming. Int J Bus Data Commun Netw 6:49–65

    Article  Google Scholar 

  22. Alhaisoni M, Ghanbari M, Liotta A (2010) Localized multistreams for P2P streaming. Int J Digit Multimed Broadcasting 2010:1–13

    Article  Google Scholar 

  23. Alhaisoni M, Liotta A, Ghanbari M (2010) Resource-awareness and trade-off optimization in P2P video streaming. Int J Adv Media Commun 41:59–77 (special issue on High-Quality Multimedia Streaming in P2P Environments)

    Article  Google Scholar 

  24. Alhaisoni M, Liotta A, Ghanbari M (2010) Resilient P2P streaming. Int J Adv Netw Serv 3:209–219

    Google Scholar 

  25. Iannone L (2009) Cross-layer routing and mobility management in wireless mesh networks. VDM Verlag

    Google Scholar 

  26. Liotta A, Liotta A (2011) Privacy in pervasive systems: legal framework and regulatory challenges. pervasive computing and communications design and deployment: technologies trends and applications. Idea Group Publishing  

    Google Scholar 

  27. Mackinnon R (2010) Liberty or safety? Both-or neither (spectral lines). IEEE Spectr 47:10

    Article  Google Scholar 

  28. Rennhard M (2004) MorphMix—a peer-to-peer-based system for anonymous internet access. Shaker Verlag GmbH, Germany

    Google Scholar 

  29. Leavitt N (2009) Anonymization technology takes a high profile. Computer 42:15–18

    Google Scholar 

  30. Clarke I, Miller S, Hong T, Sandberg O, Wiley B (2002) Protecting free expression online with Freenet. IEEE Internet Comput 6:40–49

    Article  Google Scholar 

  31. Bianco C, Cucchietti F, Griffa G (2007) Energy consumption trends in the next generation access network—a telco perspective. Int Telecommun Energy Conf 737–742

    Google Scholar 

  32. Restrepo J, Gruber C, Machuca C (2009) Energy profile aware routing. IEEE Int Conf Commun 1–5

    Google Scholar 

  33. Zittrain J (2009) The future of the internet and how to stop it. Yale University Press, London

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antonio Liotta .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Liotta, A., Exarchakos, G. (2011). A Peek at the Future Internet. In: Networks for Pervasive Services. Lecture Notes in Electrical Engineering, vol 92. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1473-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-1473-1_10

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-1472-4

  • Online ISBN: 978-94-007-1473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics