Abstract
The Internet “connectivity machine” is the generative engine of our modern digital society. It has been the launching pad of the Web (now the Web 2.0), truly the largest and most versatile information system ever built. While the Web phenomenon relentlessly continues, scientists worldwide are now living the dream of yet a more generative next-generation network. This chapter explores some prominent research directions, discussing the Internet of Things, context-aware networks, small world networks, scale-free networks, autonomic networks, dependable networks, the privacy vs. security dichotomy and the two facets of energy-efficient networks.
The best way to predict the future is to invent it
Alan Key, computer scientist
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Autonomic networks are envisioned to be able to self-configure, self-heal, self-optimize and self-protect with minimal human intervention, according to the autonomic computing principles.
- 2.
Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object for the purpose of identification and tracking.
- 3.
Recent literature describing the properties and mechanisms of small-world and scale-free networks is included in our “References” section.
- 4.
A link is “weak” when its addition or removal does not significantly change the mean value of a target measure (P. Csermely, “Weak Links”, Springer 2009).
- 5.
A.E. Motter, Cascade control and defense in complex networks. Phys Rev Lett 93, 098701.
- 6.
Nestedness indicates the hierarchical structure of networks. Each element of the top network usually consists of an entire network of elements at the lower level. Nestedness helps us to explain the complexity of networks.
- 7.
Hubs are connection-rich network elements.
- 8.
In hierarchical networks, the inner core becomes a rich club if it is formed by the hubs of the network. For example, in the Internet, the routers form rich clubs.
- 9.
In VIP clubs, the most influential members have low number of connections. However, many of these connections lead to hubs.
- 10.
Optical buffering is currently one of the major hurdles in the realization of all-optical networks, which would lead to a substantial increase in network capacity.
- 11.
C. Bianco, F. Cucchietti, and G. Gri, “Energy consumption trends in the next generation access network—a telco perspective,” International Telecommunications Energy Conference, INTELEC, Sep. 30–Oct. 4, Rome, Italy, 2007.
- 12.
Source The Economist, 8–14 January 2011.
- 13.
- 14.
As of January 2011, the number of android devices has surpassed the number of iPhones. However, the number of iPhone apps is significantly larger.
References
Chaouchi H (2010) The internet of things: connecting objects. Wiley-ISTE
Kim S, Choi M, Ju H, Ejiri M, Hong J (2008) Towards management requirements of future internet. Challenges for next generation network operations and service management. Springer, pp 156–166
Liotta A, Liotta A (2008) P2P in a regulated environment: challenges and opportunities for the operator. BT Technol J 26:150–157
Akyildiz IF, Vuran MC (2010) Wireless sensor networks. Wiley
Farooq M (2010) Bee-inspired protocol engineering: from nature to networks. Springer, Heidelberg
Haykin S (2008) Neural networks and learning machines. Prentice Hall, New Jersey
XiaoFan W, Guanrong C (2003) Complex networks: small-world, scale-free and beyond. IEEE Circuits Syst Mag 3:6–20
Dressler F, Akan O (2010) Bio-inspired networking: from theory to practice. IEEE Commun Mag 48:176–183
Buchanan M (2003) Nexus: small worlds and the groundbreaking theory of networks. W.W. Norton & Company
Gammon K (2010) Four ways to reinvent the Internet. doi:10.1038/463602a
Clark DD, Partridge C, Braden RT, Davie B, Floyd S, Jacobson V, Katabi D, Minshall G, Ramakrishnan KK, Roscoe T, Stoica I, Wroclawski J, Zhang L (2005) Making the world (of communications) a different place. SIGCOMM Comput Commun Rev 35:91–96
Csermely P (2009) Weak links: the universal key to the stability of networks and complex systems. Springer
Dhillon S (2008) Ant routing, searching and topology estimation algorithms for ad hoc networks. Delft University Press
Papadimitriou D (ed) (2009) Future internet—the cross-ETP vision document, v. 1.0. http://www.futureinternet.eu
Jennings B, van der Meer S, Balasubramaniam S, Botvich D, Foghlu M, Donnelly W, Strassner J (2007) Towards autonomic management of communications networks. IEEE Commun Mag 45:112–121
Agboma F, Liotta A (2010) Quality of experience management in mobile content delivery systems. J Telecommun Syst (Spacial issue on the Quality of Experience issues in Multimedia Provision, 14 pages, Springer; Online First, 24 June 2010). doi:10.1007/s11235-010-9355-6
Menkovski V, Exarchakos G, Liotta A, Sánchez AC (2010) Quality of experience models for multimedia streaming. Int J Mobile Comput Multimedia Commun (IJMCMC) 2(4):1–20. doi:10.4018/jmcmc.2010100101
Handley M (2006) Why the Internet only just works. BT Technol J 24:119–129
Alhaisoni M, Liotta A (2009) Characterization of signaling and traffic in Joost. Peer-to-peer Netw Appl 2:75–83
Alhaisoni M, Liotta A, Ghanbari M (2009) Improving P2P streaming methods for IPTV. Int J Adv Intell Syst 2:354–365
Alhaisoni M, Ghanbari M, Liotta A (2010) Scalable P2P video streaming. Int J Bus Data Commun Netw 6:49–65
Alhaisoni M, Ghanbari M, Liotta A (2010) Localized multistreams for P2P streaming. Int J Digit Multimed Broadcasting 2010:1–13
Alhaisoni M, Liotta A, Ghanbari M (2010) Resource-awareness and trade-off optimization in P2P video streaming. Int J Adv Media Commun 41:59–77 (special issue on High-Quality Multimedia Streaming in P2P Environments)
Alhaisoni M, Liotta A, Ghanbari M (2010) Resilient P2P streaming. Int J Adv Netw Serv 3:209–219
Iannone L (2009) Cross-layer routing and mobility management in wireless mesh networks. VDM Verlag
Liotta A, Liotta A (2011) Privacy in pervasive systems: legal framework and regulatory challenges. pervasive computing and communications design and deployment: technologies trends and applications. Idea Group Publishing
Mackinnon R (2010) Liberty or safety? Both-or neither (spectral lines). IEEE Spectr 47:10
Rennhard M (2004) MorphMix—a peer-to-peer-based system for anonymous internet access. Shaker Verlag GmbH, Germany
Leavitt N (2009) Anonymization technology takes a high profile. Computer 42:15–18
Clarke I, Miller S, Hong T, Sandberg O, Wiley B (2002) Protecting free expression online with Freenet. IEEE Internet Comput 6:40–49
Bianco C, Cucchietti F, Griffa G (2007) Energy consumption trends in the next generation access network—a telco perspective. Int Telecommun Energy Conf 737–742
Restrepo J, Gruber C, Machuca C (2009) Energy profile aware routing. IEEE Int Conf Commun 1–5
Zittrain J (2009) The future of the internet and how to stop it. Yale University Press, London
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Liotta, A., Exarchakos, G. (2011). A Peek at the Future Internet. In: Networks for Pervasive Services. Lecture Notes in Electrical Engineering, vol 92. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1473-1_10
Download citation
DOI: https://doi.org/10.1007/978-94-007-1473-1_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-1472-4
Online ISBN: 978-94-007-1473-1
eBook Packages: EngineeringEngineering (R0)