Skip to main content

The Implications of Pervasive Computing on Network Design

  • Chapter
Intelligent Spaces

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Mark Weiser’s late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser M. The Computer for the 21 st Century. Scientific American, September 1991:265: 3:94–104.

    Google Scholar 

  2. Durand A, Huitema C. The Host-Density Ratio for Address Assignment Efficiency: An Update on the H Ratio. Request for Comments 3194, Internet Engineering Task Force, November 2001.

    Google Scholar 

  3. Gershenfeld N and Krikorian R. Building Intelligence. June 2002 — http://www.media. mit.edu/physics/projects/IP/bldg/bi/

    Google Scholar 

  4. Krikorian R. Internet 0: Bringing IP to the Leaf Node. April 2003 — http://www.bitwaste.com/wasted-bits/blog/conferences/et2003/I0-oreilly.pdf

    Google Scholar 

  5. Yokoji S, Takahashi K, and Miura N. Kokono Search: A Location-based Search Engine. Proc Tenth International World Wide Web Conference (WWW 10) poster, May 2001 — http://wwwlO.Org/cdrom/posters/contents.html#a5

    Google Scholar 

  6. Buyukkokten O et al. Exploiting Geographical Location Information of Web Pages. (Informal) Proc Workshop on Web Databases (WebDB’99), ACM, June 1999 — http://citeseer.ist.psu.edu/buyukkokten99exploiting.html

    Google Scholar 

  7. Shrikumar H. IPic — A Match Head Sized Web Server. October 2002 — http://www.ccs.cs.umass.edu/shri/iPic.html

    Google Scholar 

  8. Shrikumar H. Connecting Absolutely Everything. White Paper WPO10308, Ipsil, 2001 — http://www.ipsil.com/resources/whitepapers/connecting.pdf

    Google Scholar 

  9. Oki B el al. The Information Bus: An Architecture for Extensible Distributed Systems. Proc 14th ACM Symposium on Operating Systems Principles, 1993 — http://www.cs.utah.edu/~retrac/cs7460/infobus.pdf

    Google Scholar 

  10. Intanagonwiwat C, Govindan R, and Estrin D. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. Proc ACM International Conference on Mobile Computing and Networks (MobiCOM’OO), ACM, August 2000 — http://www.isi.edu/scadds/projects/diffusion.html#publications

    Google Scholar 

  11. Soppera A et al. GAP: The Generic Announcement Protocol for Event Messaging. Proc London Communication Symposium (LCS’03), UCL, September 2003 — http://www.ee.ucl.ac.uk/lcs/papers2003/103.pdf

    Google Scholar 

  12. Deering S E. Multicast Routing in Internetworks and Extended LANs. Proc ACM SIGCOMM’88, August 1988.

    Google Scholar 

  13. Bacon J et al. Generic Support for Distributed Applications. IEEE Computer, March 2000 — http://www.cl.cam.ac.Uk/Research/SRG/opera/publications/pre-2002.html#2000

    Google Scholar 

  14. Saltzer J H, Reed D P, and Clark D D. End-to-End Arguments in System Design. ACM Transactions on Computer Systems, November 1984:2:4:277–288 — http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf (An earlier version appeared in the Second International Conference on Distributed Computing Systems, April, 1981:509-512.)

    Article  Google Scholar 

  15. Rowstron A et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure. In: Crowcroft J, Hofmann M (editors). Proc 3rd International COST264 Workshop on Networked Group Communication (NGC’Ol), Springer LNCS 2233, November 2001:30–34 — http://link.springer.de/link/service/series/0558/bibs/2233/22330030.htm

    Google Scholar 

  16. Heidemann J et al. Building Efficient Wireless Sensor Networks with Low-Level Naming. Proc Symposium on Operating Systems Principles, ACM, October 2001:146–159 — http://www.isi.edu/~johnh/PAPERS/HeidemannOhttp://www.isi.edu/~johnh/PAPERS/HeidemannO 1 c.html

    Google Scholar 

  17. Stajano F and Anderson R. The Resurrecting Duckling: Security Issues for ad hoc Wireless Networks. In: Christianson B, Crispo B, Roe M (editors). Proc 7th International Workshop on Security Protocols, Springer LNCS 1796, April 1999:172–194 — http://citeseer.ist.psu.edu/22797citeseer.ist.psu.edu/227971.html

    Google Scholar 

  18. Briscoe B. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. Proc 1st International COST264 Workshop on Networked Group Communication (NGC’99), Springer LNCS 1736, November 1999 — http://www.btexact.com/publications/papers?doc=70250

    Google Scholar 

  19. Floyd S et al. A Reliable Multicast Framework for Lightweight Sessions and Application Level Framing. Proc ACM SIGCOMM’95, Computer Communication Review, October 1995:25:4:342–356 — http://www.acm.org/sigcomm/ccr/archive/1995/conf/floyd.html

    Article  Google Scholar 

  20. Fall K. Delay Tolerant Networking Research Group. Working group charter, Internet Research Task Force, 2002 — http://www.dtnrg.org/

    Google Scholar 

  21. Fall K. A Delay Tolerant Network Architecture for Challenged Internets. Proc ACM SIGCOMM’03, Computer Communication Review, October 2003:33:4:27–34 — http://portal.acm.org/citation.cfm?id=863960&dl=ACM&coll=portal

    Google Scholar 

  22. Kahn J M et al. Emerging Challenges: Mobile Networking for’ smart Dust’. Journal of Communications and Networks, September 2000:2:3:188–196 — http://citeseer.ist.psu.edu/kahnOOemerging.html

    Google Scholar 

  23. Zhou L et al. Corner-cube Retroreflectors Based on Structure-assisted Assembly for Freespace Optical Communication. IEEE Journal of Microelectromechanical Systems, June 2003:12:3:233–242 — http://www-ee.stanford.edu/~jmk/pubs/ccr.jmems.pdf

    Article  Google Scholar 

  24. Chlamtac I, Petrioli C, and Redi J. Energy Conservation in Access Protocols for Mobile Computing and Communication. Microprocessors and Microsystems Journal, March 1998:1:20–32.

    Google Scholar 

  25. Chockalingam A and Zorzi M. Energy Efficiency of Media Access Protocols for Mobile Data Networks. IEEE Transactions on Communications, November 1998:46:1:1418–1421 — http://citeseer.nj.nec.com/259740.html

    Article  Google Scholar 

  26. Kravets R and Krishnan P. Application-Driven Power Management for Mobile Communication. Wireless Networks, 2000:6:263–277 — http://citeseer.nj.nec.com/kravets98applicationdriven.html

    Article  MATH  Google Scholar 

  27. Soppera A, Burbridge T, and Nekovee M. Index-based Event Messaging. Proc International Workshop on Large-Scale Group Communication, October 2003 — http://srds2003.cnuce.cnr.it/papers/soppera.pdf

    Google Scholar 

  28. Tschudin C, Lundgren H, and Nordström E. Embedding MANETs in the Real World. Proc Conference on Personal Wireless Communications (TWC’03), IFIP, September 2003 — http://www.it.uu.se/research/group/core/publications.php?pub_id=41

    Google Scholar 

  29. Perkins C, Belding-Royer E, and Das S. Ad hoc on-demand distance vector (AODV) routing. RFC 3561, Internet Engineering Task Force, July 2003 — http://www.tcs.hut.fi/~anttit/manet/aodv/

    Google Scholar 

  30. Baker F. An Outsider’s View of MANET. Internet Draft, Internet Engineering Task Force, March 2002 — http://bgp.potaroo.net/ietf/old-ids/draft-baker-manet-review-01.txt

    Google Scholar 

  31. Singh S, Woo M, and Raghavendra C S. Power-Aware Routing in Mobile ad hoc Networks. Proc ACM International Conference on Mobile Computing and Networks (MobiCOM’98), 1998:181–190 — http://citeseer.nj.nec.com/singh98poweraware.html

    Google Scholar 

  32. Chang J H and Tassiulas L. Energy Conserving Routing in Wireless Ad-hoc Networks. Proc IEEE Conference on Computer Communications, 2000:22–31 — http://citeseer.nj.nec.com/changOOenergy.html

    Google Scholar 

  33. Madden S R et al. Supporting Aggregate Queries over Ad-hoc Wireless Sensor Networks. Proc Workshop on Mobile Computing and Systems Applications, 2002 — http://www.cs.berkeley.edu/~madden/madden_aggregation.pdf

    Google Scholar 

  34. Cain B, Speakman T, and Towsley D. Generic Router Assist (GRA) Building Block: Motivation and Architecture. Internet draft, Internet Engineering Task Force, March 2000 — http://bgp.potaroo.net/ietf/old-ids/draft-ietf-rrnt-gra-arch-01.txt

    Google Scholar 

  35. Duros E et al. A Link-Layer Tunneling Mechanism for Unidirectional Links. RFC 3077, Internet Engineering Task Force, March 2001.

    Google Scholar 

  36. Perlman R. Network Layer Protocols with Byzantine Robustness. Technical Report 429, MIT, Based on PhD thesis, October 1988 — http://www.lcs.mit.edu/publications/specpub.php?id=997

    Google Scholar 

  37. Zhu D, Gritter M, and Cheriton D R. Feedback-based Routing. Computer Communication Review, January 2003:33:1:71–76 — http://portal.acm.org/citation.cfm?id=774774&dl=ACM&coll=portal

    Article  Google Scholar 

  38. Law Y et al. Assessing Security-Critical Energy-Efficient Sensor Networks. In: Gritzalis D, Vimercati S D C D, Samarati P, Katsikas S (editors). Proc 18th TC11 Intl Conf on Information Security. IFIP, Kluwer, May 2003:459–463 — http://www.ub.utwente.nl/webdocs/ctit/1/00000087.pdf

    Google Scholar 

  39. Adler M et al. Channelisation Problem in Large Scale Data Dissemination. Proc IEEE International Conference on Network Protocols (ICNP’Ol), 2001 — http://www.cs.umass.edu/~micah/pubs/channelization.ps

    Google Scholar 

  40. Thaler D and Handley M. On the Aggregatability of Multicast Forwarding State. Proc IEEE Conference on Computer Communications (Infocom 2000), March 2000 — http://www.ieee-infocom.org/2000/papers/632.ps

    Google Scholar 

  41. Crowcroft J et al. Channel Islands in a Reflective Ocean: Large Scale Event Distribution in Heterogeneous Networks. IEEE Communications Magazine, September 2002:40:9:112–115 — http://www.cl.cam.ac.uk/Research/SRG/opera/publications/2002-pubs.html

    Article  Google Scholar 

  42. Kulik J. Fast and Flexible Forwarding for Internet Subscription Systems. Proc 2nd Intl Workshop on Distributed Event-based Systems, ACM Press, June 2003:1–8 — http://doi.acm.org/10.1145/966618.966635

    Google Scholar 

  43. Crowcroft J et al. Plutarch: An Argument for Network Pluralism. SIGCOMM FDNA’03, ACM, 2003 — http://www.cl.cam.ac.uk/~jac22/out/plutarch.pdf

    Google Scholar 

  44. Brownlee N and Ma A. NeTraMet Flow Lifetimes and Implications for Routing Context. Data in and out of UC San Diego Supercomputer Center collected June 2002 — http://www.caida.org/analysis/workload/netramet/lifetimes/

    Google Scholar 

  45. Beverly R and Claffy K. Wide-Area IP Multicast Traffic Characterisation. IEEE Network, January/February 2003 — http://www.caida.org/outreach/papers/2003/mcastworkchar/

    Google Scholar 

  46. Crovella M and Bestavros A. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking, 1997:5:6:835–846 — http://citeseer.ist.psu.edu/22080.html

    Article  Google Scholar 

  47. Wan C Y et al. CODA: Congestion Detection and Avoidance in Sensor Networks. Proc First International Conference on Embedded Networked Sensor Systems, ACM, 2003:266–279 — http://comet.ctr.columbia.edu/armstrong/

    Google Scholar 

  48. Speakman T et al. PGM Reliable Transport Protocol Specification. RFC 3208, Internet Engineering Task Force, December 2001.

    Google Scholar 

  49. Sastry N, Shankar U, and Wagner D. Secure Verification of Location Claims. Proc Workshop on Wireless Security (WiSe 2003), ACM, September 2003 — http://www.cs.berkeley.edu/~nks/locprove/

    Google Scholar 

  50. Gabber E and Wool A. On Location-Restricted Services. IEEE Network, 1999:13:6:44–52.

    Article  Google Scholar 

  51. Anderson R and Kuhn M G. Tamper Resistance — A Cautionary Note. Proc Second USENIX Electronic Commerce Workshop, November 1996:1–21 — http://www.cl.cam.ac.uk/users/rjal4/#Reliability

    Google Scholar 

  52. Perrig A et al. SPINS: Security Protocols for Sensor Networks. Proc ACM International Conference on Mobile Computing and Networks (Mobicom’01), July 2001:189–199 — http://citeseer.ist.psu.edu/568886.html

    Google Scholar 

  53. Perrig A et al. TESLA: Multicast Source Authentication Transform Introduction. Internet draft-ietf-msec-tesla-intro-03.txt, Internet Engineering Task Force, August 2004.

    Google Scholar 

  54. Juels A. ‘Yoking-proofs’ for RFID Tags. In: Sandhu R, Thomas R (editors). Proc First International Workshop on Pervasive Computing and Communication Security. IEEE Press, 2004 — http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/rfidyoke/

    Google Scholar 

  55. Chan H, Perrig A, and Song D. Random Key Predistribution Schemes for Sensor Networks. Proc IEEE Symposium on Security and Privacy, 2003 — http://www.ece.emu.edu/~adrian/publ ications.html

    Google Scholar 

  56. Basagni S et al. Secure Pebblenet. Proc International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’01), ACM, October 2001:156–163 — http://www.ece.neu.edu/faculty/basagni/publications.html

    Google Scholar 

  57. Moyer M J, Rao J R, and Rohatgi P. A Survey of Multicast Security Issues in Multicast Communications. IEEE Network, 1999:13:6:12–23 — http://www.comsoc.org/

    Article  Google Scholar 

  58. Ratnasamy S et al. Application-Level Multicast Using Content-Addressable Networks. Proc 3rd International COST264 Workshop on Networked Group Communication (NGC’01), Springer LNCS 2233, November 2001:LNCS2233:14–29 — http://link.springer.de/link/service/series/0558/bibs/2233/22330014.htm

    Google Scholar 

  59. Reed D P. That Sneaky Exponential — Beyond Metcalfe’s Law to the Power of Community Building. Online Supplement to Article in Context magazine, 1999 — http://www.reedwww.reed.com/Papers/GFN/reedslaw.html

    Google Scholar 

  60. Clark D et al. Tussle in Cyberspace: Defining Tomorrow’s Internet. Proc ACM SIGCOMM’02, Computer Communication Review, August 2002:32:4 — http://www.acm.org/sigcomm/sigcomm2002/papers/tussle.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this chapter

Cite this chapter

Briscoe, R. (2006). The Implications of Pervasive Computing on Network Design. In: Steventon, A., Wright, S. (eds) Intelligent Spaces. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84628-429-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-429-8_18

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-002-3

  • Online ISBN: 978-1-84628-429-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics