Abstract
Mark Weiser’s late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser M. The Computer for the 21 st Century. Scientific American, September 1991:265: 3:94–104.
Durand A, Huitema C. The Host-Density Ratio for Address Assignment Efficiency: An Update on the H Ratio. Request for Comments 3194, Internet Engineering Task Force, November 2001.
Gershenfeld N and Krikorian R. Building Intelligence. June 2002 — http://www.media. mit.edu/physics/projects/IP/bldg/bi/
Krikorian R. Internet 0: Bringing IP to the Leaf Node. April 2003 — http://www.bitwaste.com/wasted-bits/blog/conferences/et2003/I0-oreilly.pdf
Yokoji S, Takahashi K, and Miura N. Kokono Search: A Location-based Search Engine. Proc Tenth International World Wide Web Conference (WWW 10) poster, May 2001 — http://wwwlO.Org/cdrom/posters/contents.html#a5
Buyukkokten O et al. Exploiting Geographical Location Information of Web Pages. (Informal) Proc Workshop on Web Databases (WebDB’99), ACM, June 1999 — http://citeseer.ist.psu.edu/buyukkokten99exploiting.html
Shrikumar H. IPic — A Match Head Sized Web Server. October 2002 — http://www.ccs.cs.umass.edu/shri/iPic.html
Shrikumar H. Connecting Absolutely Everything. White Paper WPO10308, Ipsil, 2001 — http://www.ipsil.com/resources/whitepapers/connecting.pdf
Oki B el al. The Information Bus: An Architecture for Extensible Distributed Systems. Proc 14th ACM Symposium on Operating Systems Principles, 1993 — http://www.cs.utah.edu/~retrac/cs7460/infobus.pdf
Intanagonwiwat C, Govindan R, and Estrin D. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. Proc ACM International Conference on Mobile Computing and Networks (MobiCOM’OO), ACM, August 2000 — http://www.isi.edu/scadds/projects/diffusion.html#publications
Soppera A et al. GAP: The Generic Announcement Protocol for Event Messaging. Proc London Communication Symposium (LCS’03), UCL, September 2003 — http://www.ee.ucl.ac.uk/lcs/papers2003/103.pdf
Deering S E. Multicast Routing in Internetworks and Extended LANs. Proc ACM SIGCOMM’88, August 1988.
Bacon J et al. Generic Support for Distributed Applications. IEEE Computer, March 2000 — http://www.cl.cam.ac.Uk/Research/SRG/opera/publications/pre-2002.html#2000
Saltzer J H, Reed D P, and Clark D D. End-to-End Arguments in System Design. ACM Transactions on Computer Systems, November 1984:2:4:277–288 — http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf (An earlier version appeared in the Second International Conference on Distributed Computing Systems, April, 1981:509-512.)
Rowstron A et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure. In: Crowcroft J, Hofmann M (editors). Proc 3rd International COST264 Workshop on Networked Group Communication (NGC’Ol), Springer LNCS 2233, November 2001:30–34 — http://link.springer.de/link/service/series/0558/bibs/2233/22330030.htm
Heidemann J et al. Building Efficient Wireless Sensor Networks with Low-Level Naming. Proc Symposium on Operating Systems Principles, ACM, October 2001:146–159 — http://www.isi.edu/~johnh/PAPERS/HeidemannOhttp://www.isi.edu/~johnh/PAPERS/HeidemannO 1 c.html
Stajano F and Anderson R. The Resurrecting Duckling: Security Issues for ad hoc Wireless Networks. In: Christianson B, Crispo B, Roe M (editors). Proc 7th International Workshop on Security Protocols, Springer LNCS 1796, April 1999:172–194 — http://citeseer.ist.psu.edu/22797citeseer.ist.psu.edu/227971.html
Briscoe B. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. Proc 1st International COST264 Workshop on Networked Group Communication (NGC’99), Springer LNCS 1736, November 1999 — http://www.btexact.com/publications/papers?doc=70250
Floyd S et al. A Reliable Multicast Framework for Lightweight Sessions and Application Level Framing. Proc ACM SIGCOMM’95, Computer Communication Review, October 1995:25:4:342–356 — http://www.acm.org/sigcomm/ccr/archive/1995/conf/floyd.html
Fall K. Delay Tolerant Networking Research Group. Working group charter, Internet Research Task Force, 2002 — http://www.dtnrg.org/
Fall K. A Delay Tolerant Network Architecture for Challenged Internets. Proc ACM SIGCOMM’03, Computer Communication Review, October 2003:33:4:27–34 — http://portal.acm.org/citation.cfm?id=863960&dl=ACM&coll=portal
Kahn J M et al. Emerging Challenges: Mobile Networking for’ smart Dust’. Journal of Communications and Networks, September 2000:2:3:188–196 — http://citeseer.ist.psu.edu/kahnOOemerging.html
Zhou L et al. Corner-cube Retroreflectors Based on Structure-assisted Assembly for Freespace Optical Communication. IEEE Journal of Microelectromechanical Systems, June 2003:12:3:233–242 — http://www-ee.stanford.edu/~jmk/pubs/ccr.jmems.pdf
Chlamtac I, Petrioli C, and Redi J. Energy Conservation in Access Protocols for Mobile Computing and Communication. Microprocessors and Microsystems Journal, March 1998:1:20–32.
Chockalingam A and Zorzi M. Energy Efficiency of Media Access Protocols for Mobile Data Networks. IEEE Transactions on Communications, November 1998:46:1:1418–1421 — http://citeseer.nj.nec.com/259740.html
Kravets R and Krishnan P. Application-Driven Power Management for Mobile Communication. Wireless Networks, 2000:6:263–277 — http://citeseer.nj.nec.com/kravets98applicationdriven.html
Soppera A, Burbridge T, and Nekovee M. Index-based Event Messaging. Proc International Workshop on Large-Scale Group Communication, October 2003 — http://srds2003.cnuce.cnr.it/papers/soppera.pdf
Tschudin C, Lundgren H, and Nordström E. Embedding MANETs in the Real World. Proc Conference on Personal Wireless Communications (TWC’03), IFIP, September 2003 — http://www.it.uu.se/research/group/core/publications.php?pub_id=41
Perkins C, Belding-Royer E, and Das S. Ad hoc on-demand distance vector (AODV) routing. RFC 3561, Internet Engineering Task Force, July 2003 — http://www.tcs.hut.fi/~anttit/manet/aodv/
Baker F. An Outsider’s View of MANET. Internet Draft, Internet Engineering Task Force, March 2002 — http://bgp.potaroo.net/ietf/old-ids/draft-baker-manet-review-01.txt
Singh S, Woo M, and Raghavendra C S. Power-Aware Routing in Mobile ad hoc Networks. Proc ACM International Conference on Mobile Computing and Networks (MobiCOM’98), 1998:181–190 — http://citeseer.nj.nec.com/singh98poweraware.html
Chang J H and Tassiulas L. Energy Conserving Routing in Wireless Ad-hoc Networks. Proc IEEE Conference on Computer Communications, 2000:22–31 — http://citeseer.nj.nec.com/changOOenergy.html
Madden S R et al. Supporting Aggregate Queries over Ad-hoc Wireless Sensor Networks. Proc Workshop on Mobile Computing and Systems Applications, 2002 — http://www.cs.berkeley.edu/~madden/madden_aggregation.pdf
Cain B, Speakman T, and Towsley D. Generic Router Assist (GRA) Building Block: Motivation and Architecture. Internet draft, Internet Engineering Task Force, March 2000 — http://bgp.potaroo.net/ietf/old-ids/draft-ietf-rrnt-gra-arch-01.txt
Duros E et al. A Link-Layer Tunneling Mechanism for Unidirectional Links. RFC 3077, Internet Engineering Task Force, March 2001.
Perlman R. Network Layer Protocols with Byzantine Robustness. Technical Report 429, MIT, Based on PhD thesis, October 1988 — http://www.lcs.mit.edu/publications/specpub.php?id=997
Zhu D, Gritter M, and Cheriton D R. Feedback-based Routing. Computer Communication Review, January 2003:33:1:71–76 — http://portal.acm.org/citation.cfm?id=774774&dl=ACM&coll=portal
Law Y et al. Assessing Security-Critical Energy-Efficient Sensor Networks. In: Gritzalis D, Vimercati S D C D, Samarati P, Katsikas S (editors). Proc 18th TC11 Intl Conf on Information Security. IFIP, Kluwer, May 2003:459–463 — http://www.ub.utwente.nl/webdocs/ctit/1/00000087.pdf
Adler M et al. Channelisation Problem in Large Scale Data Dissemination. Proc IEEE International Conference on Network Protocols (ICNP’Ol), 2001 — http://www.cs.umass.edu/~micah/pubs/channelization.ps
Thaler D and Handley M. On the Aggregatability of Multicast Forwarding State. Proc IEEE Conference on Computer Communications (Infocom 2000), March 2000 — http://www.ieee-infocom.org/2000/papers/632.ps
Crowcroft J et al. Channel Islands in a Reflective Ocean: Large Scale Event Distribution in Heterogeneous Networks. IEEE Communications Magazine, September 2002:40:9:112–115 — http://www.cl.cam.ac.uk/Research/SRG/opera/publications/2002-pubs.html
Kulik J. Fast and Flexible Forwarding for Internet Subscription Systems. Proc 2nd Intl Workshop on Distributed Event-based Systems, ACM Press, June 2003:1–8 — http://doi.acm.org/10.1145/966618.966635
Crowcroft J et al. Plutarch: An Argument for Network Pluralism. SIGCOMM FDNA’03, ACM, 2003 — http://www.cl.cam.ac.uk/~jac22/out/plutarch.pdf
Brownlee N and Ma A. NeTraMet Flow Lifetimes and Implications for Routing Context. Data in and out of UC San Diego Supercomputer Center collected June 2002 — http://www.caida.org/analysis/workload/netramet/lifetimes/
Beverly R and Claffy K. Wide-Area IP Multicast Traffic Characterisation. IEEE Network, January/February 2003 — http://www.caida.org/outreach/papers/2003/mcastworkchar/
Crovella M and Bestavros A. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking, 1997:5:6:835–846 — http://citeseer.ist.psu.edu/22080.html
Wan C Y et al. CODA: Congestion Detection and Avoidance in Sensor Networks. Proc First International Conference on Embedded Networked Sensor Systems, ACM, 2003:266–279 — http://comet.ctr.columbia.edu/armstrong/
Speakman T et al. PGM Reliable Transport Protocol Specification. RFC 3208, Internet Engineering Task Force, December 2001.
Sastry N, Shankar U, and Wagner D. Secure Verification of Location Claims. Proc Workshop on Wireless Security (WiSe 2003), ACM, September 2003 — http://www.cs.berkeley.edu/~nks/locprove/
Gabber E and Wool A. On Location-Restricted Services. IEEE Network, 1999:13:6:44–52.
Anderson R and Kuhn M G. Tamper Resistance — A Cautionary Note. Proc Second USENIX Electronic Commerce Workshop, November 1996:1–21 — http://www.cl.cam.ac.uk/users/rjal4/#Reliability
Perrig A et al. SPINS: Security Protocols for Sensor Networks. Proc ACM International Conference on Mobile Computing and Networks (Mobicom’01), July 2001:189–199 — http://citeseer.ist.psu.edu/568886.html
Perrig A et al. TESLA: Multicast Source Authentication Transform Introduction. Internet draft-ietf-msec-tesla-intro-03.txt, Internet Engineering Task Force, August 2004.
Juels A. ‘Yoking-proofs’ for RFID Tags. In: Sandhu R, Thomas R (editors). Proc First International Workshop on Pervasive Computing and Communication Security. IEEE Press, 2004 — http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/rfidyoke/
Chan H, Perrig A, and Song D. Random Key Predistribution Schemes for Sensor Networks. Proc IEEE Symposium on Security and Privacy, 2003 — http://www.ece.emu.edu/~adrian/publ ications.html
Basagni S et al. Secure Pebblenet. Proc International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’01), ACM, October 2001:156–163 — http://www.ece.neu.edu/faculty/basagni/publications.html
Moyer M J, Rao J R, and Rohatgi P. A Survey of Multicast Security Issues in Multicast Communications. IEEE Network, 1999:13:6:12–23 — http://www.comsoc.org/
Ratnasamy S et al. Application-Level Multicast Using Content-Addressable Networks. Proc 3rd International COST264 Workshop on Networked Group Communication (NGC’01), Springer LNCS 2233, November 2001:LNCS2233:14–29 — http://link.springer.de/link/service/series/0558/bibs/2233/22330014.htm
Reed D P. That Sneaky Exponential — Beyond Metcalfe’s Law to the Power of Community Building. Online Supplement to Article in Context magazine, 1999 — http://www.reedwww.reed.com/Papers/GFN/reedslaw.html
Clark D et al. Tussle in Cyberspace: Defining Tomorrow’s Internet. Proc ACM SIGCOMM’02, Computer Communication Review, August 2002:32:4 — http://www.acm.org/sigcomm/sigcomm2002/papers/tussle.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this chapter
Cite this chapter
Briscoe, R. (2006). The Implications of Pervasive Computing on Network Design. In: Steventon, A., Wright, S. (eds) Intelligent Spaces. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84628-429-8_18
Download citation
DOI: https://doi.org/10.1007/978-1-84628-429-8_18
Publisher Name: Springer, London
Print ISBN: 978-1-84628-002-3
Online ISBN: 978-1-84628-429-8
eBook Packages: Computer ScienceComputer Science (R0)