Next Issue
Volume 2, December
Previous Issue
Volume 2, June
 
 

Future Internet, Volume 2, Issue 3 (September 2010) – 11 articles , Pages 190-430

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
423 KiB  
Article
Anticipation of Traffic Demands to Guarantee QoS in IP/Optical Networks
by Carolina Pinart
Future Internet 2010, 2(3), 417-430; https://doi.org/10.3390/fi2030417 - 21 Sep 2010
Cited by 2 | Viewed by 5826
Abstract
Traffic in the Internet backbone is expected to grow above a few Tbit/s in 2020. To cope with this, operators are moving to IP/optical network architectures, where IP is the convergence layer for all services. On the other hand, the quality of service [...] Read more.
Traffic in the Internet backbone is expected to grow above a few Tbit/s in 2020. To cope with this, operators are moving to IP/optical network architectures, where IP is the convergence layer for all services. On the other hand, the quality of service (QoS) requirements of future applications encompasses the individualization of services and the assurance of stricter quality parameters such as latency, jitter or capacity. In other words, future optical networks will not only transport more IP data, but they will also have to offer differentiated QoS requirements to services. Finally, some emerging applications, e.g., grid computing, need greater flexibility in the usage of network resources, which involves establishing and releasing connections as if they were virtualized resources controlled by other elements or layers. In this context, traffic-driven lightpath provisioning and service-plane approaches arise as very interesting candidate solutions to solve the main challenges described above. This work reviews the concepts of service-oriented and self-managed networks and relates them to propose an integrated approach to assure QoS by offering flow-aware networking in the sense that traffic demands will be anticipated in a suitable way, lightpaths will be established taking into account QoS information (i.e., impairments) and complex services will be decomposed into optical connections so that the above techniques can be employed to assure QoS for any service. Full article
(This article belongs to the Special Issue QoS in Wired and Wireless IP Networks)
Show Figures

Figure 1

214 KiB  
Review
A Survey of QoS Multicast in Ad Hoc Networks
by Viet Thi Minh Do, Lars Landmark and Øivind Kure
Future Internet 2010, 2(3), 388-416; https://doi.org/10.3390/fi2030388 - 14 Sep 2010
Cited by 5 | Viewed by 7499
Abstract
This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. Our contribution is an exploration of the design space and an identification [...] Read more.
This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. Our contribution is an exploration of the design space and an identification of areas that have not been fully explored. We discuss the design space of central mechanisms and classify proposed QoS multicast schemes according to the mechanisms they used. In addition, we summarize the scenarios used for evaluating their performance. Furthermore, we identify issues, mechanisms, and scenarios that have not been fully investigated in existing works. The paper provides a coherent understanding of design principles, conceptual operation, and evaluated scenarios of schemes designed for QoS multicast application in mobile ad hoc networks (MANETs). It also outlines new areas for future research in this field. Full article
(This article belongs to the Special Issue QoS in Wired and Wireless IP Networks)
Show Figures

Figure 1

250 KiB  
Review
Towards the Robotic “Avatar”: An Extensive Survey of the Cooperation between and within Networked Mobile Sensors
by Sebahattin Topal, İsmet Erkmen and Aydan M. Erkmen
Future Internet 2010, 2(3), 363-387; https://doi.org/10.3390/fi2030363 - 14 Sep 2010
Cited by 8 | Viewed by 6879
Abstract
Cooperation between networked mobile sensors, wearable and sycophant sensor networks with parasitically sticking agents, and also having human beings involved in the loop is the “Avatarization” within the robotic research community, where all networks are connected and where you can connect/disconnect at any [...] Read more.
Cooperation between networked mobile sensors, wearable and sycophant sensor networks with parasitically sticking agents, and also having human beings involved in the loop is the “Avatarization” within the robotic research community, where all networks are connected and where you can connect/disconnect at any time to acquire data from a vast unstructured world. This paper extensively surveys the networked robotic foundations of this robotic biological “Avatar” that awaits us in the future. Cooperation between networked mobile sensors as well as cooperation of nodes within a network are becoming more robust, fault tolerant and enable adaptation of the networks to changing environment conditions. In this paper, we survey and comparatively discuss the current state of networked robotics via their critical application areas and their design characteristics. We conclude by discussing future challenges. Full article
(This article belongs to the Special Issue Networked Sensors and Actuators)
Show Figures

Figure 1

994 KiB  
Article
Can Global Visual Features Improve Tag Recommendation for Image Annotation?
by Mathias Lux, Arthur Pitman and Oge Marques
Future Internet 2010, 2(3), 341-362; https://doi.org/10.3390/fi2030341 - 27 Aug 2010
Cited by 5 | Viewed by 7455
Abstract
Recent advances in the fields of digital photography, networking and computing, have made it easier than ever for users to store and share photographs. However without sufficient metadata, e.g., in the form of tags, photos are difficult to find and organize. In [...] Read more.
Recent advances in the fields of digital photography, networking and computing, have made it easier than ever for users to store and share photographs. However without sufficient metadata, e.g., in the form of tags, photos are difficult to find and organize. In this paper, we describe a system that recommends tags for image annotation. We postulate that the use of low-level global visual features can improve the quality of the tag recommendation process when compared to a baseline statistical method based on tag co-occurrence. We present results from experiments conducted using photos and metadata sourced from the Flickr photo website that suggest that the use of visual features improves the mean average precision (MAP) of the system and increases the system's ability to suggest different tags, therefore justifying the associated increase in complexity. Full article
Show Figures

Figure 1

965 KiB  
Article
Energy Efficient Routing and Node Activity Scheduling in the OCARI Wireless Sensor Network
by Saoucene Mahfoudh, Pascale Minet and Ichrak Amdouni
Future Internet 2010, 2(3), 308-340; https://doi.org/10.3390/fi2030308 - 17 Aug 2010
Cited by 10 | Viewed by 8556
Abstract
Sensor nodes are characterized by a small size, a low cost, an advanced communication technology, but also a limited amount of energy. Energy efficient strategies are required in such networks to maximize network lifetime. In this paper, we focus on a solution integrating [...] Read more.
Sensor nodes are characterized by a small size, a low cost, an advanced communication technology, but also a limited amount of energy. Energy efficient strategies are required in such networks to maximize network lifetime. In this paper, we focus on a solution integrating energy efficient routing and node activity scheduling. The energy efficient routing we propose, called EOLSR, selects the route and minimizes the energy consumed by an end-to-end transmission, while avoiding nodes with low residual energy. Simulation results show that EOLSR outperforms the solution selecting the route of minimum energy as well as the solution based on node residual energy. Cross-layering allows EOLSR to use information from the application layer or the MAC layer to reduce its overhead and increase network lifetime. Node activity scheduling is based on the following observation: the sleep state is the least power consuming state. So, to schedule node active and sleeping periods, we propose SERENA that colors all network nodes using a small number of colors, such that two nodes with the same color can transmit without interfering. The node color is mapped into a time slot during which the node can transmit. Consequently, each node is awake during its slot and the slots of its one-hop neighbors, and sleeps in the remaining time. We evaluate SERENA benefits obtained in terms of bandwidth, delay and energy. We also show how cross-layering with the application layer can improve the end-to-end delays for data gathering applications. Full article
(This article belongs to the Special Issue Networked Sensors and Actuators)
Show Figures

Graphical abstract

211 KiB  
Article
Dynamic Resource Allocation and QoS Control Capabilities of the Japanese Academic Backbone Network
by Shigeo Urushidani, Kensuke Fukuda, Michihiro Koibuchi, Motonori Nakamura, Shunji Abe, Yusheng Ji, Michihiro Aoki and Shigeki Yamada
Future Internet 2010, 2(3), 295-307; https://doi.org/10.3390/fi2030295 - 09 Aug 2010
Cited by 1 | Viewed by 7187
Abstract
Dynamic resource control capabilities have become increasingly important for academic networks that must support big scientific research projects at the same time as less data intensive research and educational activities. This paper describes the dynamic resource allocation and QoS control capabilities of the [...] Read more.
Dynamic resource control capabilities have become increasingly important for academic networks that must support big scientific research projects at the same time as less data intensive research and educational activities. This paper describes the dynamic resource allocation and QoS control capabilities of the Japanese academic backbone network, called SINET3, which supports a variety of academic applications with a wide range of network services. The article describes the network architecture, networking technologies, resource allocation, QoS control, and layer-1 bandwidth on-demand services. It also details typical services developed for scientific research, including the user interface, resource control, and management functions, and includes performance evaluations. Full article
(This article belongs to the Special Issue QoS in Wired and Wireless IP Networks)
Show Figures

Figure 1

1021 KiB  
Article
Implementing Value Added Applications in Next Generation Networks
by Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou and Yuan-Kuang Tu
Future Internet 2010, 2(3), 282-294; https://doi.org/10.3390/fi2030282 - 06 Aug 2010
Cited by 3 | Viewed by 10337
Abstract
One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telecom operators that have been focusing on providing Internet services through their telecom networks with [...] Read more.
One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telecom operators that have been focusing on providing Internet services through their telecom networks with telecom-grade mechanisms. In this article, we show that IP Multimedia Subsystem (IMS) is a telecom-grade mechanism that addresses this important issue. In Next Generation Network (NGN), IMS supports IP-based multimedia services that can be accessed from various wireless and wired access technologies through fixed-mobile convergence. We show how to integrate Internet Protocol Television (IPTV) with NGN/IMS to offer enhanced IPTV services for subscribers with set-top boxes or mobile phones. We specifically describe the implementations of three services: weather forecasts, short messages on TV screens and TV shopping/food ordering for mobile users. Although these services can be directly implemented in the Internet, our commercial operation experiences indicate that the NGN/IMS implementation has advantages in terms of telecom-grade security, Quality of Service (QoS), and flexible service creation. Full article
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)
Show Figures

Graphical abstract

303 KiB  
Article
Tales from the Field: Search Strategies Applied in Web Searching
by Iris Xie and Soohyung Joo
Future Internet 2010, 2(3), 259-281; https://doi.org/10.3390/fi2030259 - 06 Aug 2010
Cited by 14 | Viewed by 6833
Abstract
In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants [...] Read more.
In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants representing the general public were recruited for this study. Search logs and verbal protocols offered rich data for the identification of different types of search strategies. Based on the findings, the authors further discuss how to enhance web-based information retrieval (IR) systems to support each type of search strategy. Full article
(This article belongs to the Special Issue Information Behavior)
Show Figures

Figure 1

1331 KiB  
Review
Ontology Alignment—A Survey with Focus on Visually Supported Semi-Automatic Techniques
by Michael Granitzer, Vedran Sabol, Kow Weng Onn, Dickson Lukose and Klaus Tochtermann
Future Internet 2010, 2(3), 238-258; https://doi.org/10.3390/fi2030238 - 04 Aug 2010
Cited by 62 | Viewed by 12132
Abstract
Semantic technologies are of paramount importance to the future Internet. The reuse and integration of semantically described resources, such as data or services, necessitates the bringing of ontologies into mutual agreement. Ontology alignment deals with the discovery of correspondences between concepts and relations [...] Read more.
Semantic technologies are of paramount importance to the future Internet. The reuse and integration of semantically described resources, such as data or services, necessitates the bringing of ontologies into mutual agreement. Ontology alignment deals with the discovery of correspondences between concepts and relations from different ontologies. Alignment provides the key ingredient to semantic interoperability. This paper gives an overview on the state of the art in the field of visually supported semi-automatic alignment techniques and presents recent trends and developments. Particular attention is given to user interfaces and visualization techniques supporting involvement of humans in the alignment process. We derive and summarize requirements for visual semi-automatic alignment systems, provide an overview of existing approaches, and discuss the possibilities for further improvements and future research. Full article
(This article belongs to the Special Issue Metadata and Markup)
Show Figures

Figure 1

285 KiB  
Review
Misbehavior Scenarios in Cognitive Radio Networks
by Stamatios Arkoulis, Giannis F. Marias, Pantelis A. Frangoudis, Jens Oberender, Alexandru Popescu, Markus Fiedler, Hermann de Meer and George C. Polyzos
Future Internet 2010, 2(3), 212-237; https://doi.org/10.3390/fi2030212 - 29 Jul 2010
Cited by 6 | Viewed by 8006
Abstract
Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being [...] Read more.
Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work. Full article
(This article belongs to the Special Issue Security for Next Generation Wireless and Decentralized Systems)
Show Figures

Figure 1

158 KiB  
Article
Applications and Security of Next-Generation, User-Centric Wireless Systems
by Jerry Rick Ramstetter, Yaling Yang and Danfeng Yao
Future Internet 2010, 2(3), 190-211; https://doi.org/10.3390/fi2030190 - 28 Jul 2010
Cited by 1 | Viewed by 6640
Abstract
Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy [...] Read more.
Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system’s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems’ robustness and security Full article
(This article belongs to the Special Issue Security for Next Generation Wireless and Decentralized Systems)
Previous Issue
Next Issue
Back to TopTop