Technologies and Protocols for the Future of Internet Design: Reinventing the Web

Technologies and Protocols for the Future of Internet Design: Reinventing the Web

Deo Prakash Vidyarthi (Jawaharlal Nehru University, India)
Indexed In: SCOPUS
Release Date: February, 2012|Copyright: © 2012 |Pages: 350
ISBN13: 9781466602038|ISBN10: 1466602031|EISBN13: 9781466602045|DOI: 10.4018/978-1-4666-0203-8


The Internet has changed significantly from its beginnings as a simple network used to pass data from one computer to another. Containing essential tools for everyday information processing, the Internet is used by small and large organizations alike and continues to evolve with the changing information technology landscape.

Technologies and Protocols for the Future of Internet Design: Reinventing the Web aims to provide relevant methods and theories in the area of the Internet design. It is written for the research community and professionals who wish to improve their understanding of future Internet technologies and gain knowledge of new tools and techniques in future Internet design.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Computer Networks and Communication
  • Internet Technologies for the Grid
  • Legal Aspects of Internet Design
  • Mobile Computing
  • Mobile IP and Cellular IP
  • Pervasive computing
  • Security Aspects of Internet Design
  • Web Applications
  • Web intelligence and mining

Reviews and Testimonials

The quality of the presentations and the scope of recent topics provide the reader with an up-to-the-moment resource in the area of Future Internet. [...] This book has been written by the research community dedicated to the public awareness. It describes how the Internet will reshape itself in the future.

– Frank Zhigang Wang, IEEE Computer Society, UK and Republic of Ireland &, University of Kent, UK

Table of Contents and List of Contributors

Search this Book:


The Internet is forty years old now, and by revisiting the history of the Internet, it has evolved tremendously since its birth. It is not a simple network collection to pass the data from one computer to another, the idea with which it was conceived. It is also not only the simple information repository, but incorporates all essential tools for day-to-day information processing. Be it a small shop, mid-level organization, or big corporation, governmental organization or non-governmental, all rely on Internet in contemporary world. As it was viewed a few years back, evolution in Information Technology complemented well by the network technology has resulted in total change in the Internet design. The drastic makeover in the Internet is well complemented by the revolution in Communication Technology. Thus, Information Technology and network communication technology together have made the Internet a complete utility for all types of affair. Grid Computing and Cloud Computing are few of the innovations, the backbone of which is Internet technology. Cyberworld is the name often used to pronounce the Internet world. The Cyberworld is changing at a rapid pace and has tremendously evolved since its inception. Many organizations are now equipped with Cybercell to look after Cyberworld affairs. Now Internet has become part and parcel of each individual well supported by all IT and communication infrastructure.

This book aims to provide relevant theoretical frameworks and the latest empirical research findings in the area of the Internet design. It is written for the research community and professionals who wish to improve their understanding of the Future Internet Technologies. It is to foresee how the Internet will reshape itself in the future and will be supported by the latest technology. This will also be a reference book for the students/researchers working in the field of computer science, Information Technology, communication technology, Cyberworld, et cetera.

In the year 1969, the Internet was conceived in a lab at the University of California, Los Angles to connect two big computers with 15-foot cables to pass the data. Since then, it has grown enormously. The first chapter of this book briefs the historical evolution of the Internet design in chronological order. Optical networking is an upcoming technology for both LAN and MAN. There are many related research issues with the optical networking technology that are pointed out in the second chapter. This also lists the current state of affairs in optical networks.

Since its inception, Web has changed a lot and so have its users. The Web now offers dynamic information and services. Users are also not mere information consumers, but are active producers now. The third chapter proposes a unified user model, in terms of a new Web access device, the browserver, which includes a browser and a server working in close cooperation. The objective is to replace the classical browser and stay backward compatible to ease the migration path.

Healthcare is an essential service. Health Care Organizations (HCOs) are now defining methodologies of the Information Technology (IT) that can provide high quality services at minimum cost. Internet technology can add a lot in this endeavor of HCO. The fourth chapter elaborates on the uses of Web technology for healthcare services.

Cellular networks, originally designed for voice services, have been upgraded to accommodate Internet services. WiFi and WiMax systems have been explicitly developed for delivering data services over wireless channels. Special design requirements of physical layer due to distinct properties of wireless channel have caused some differences with those of wired networks. Low bandwidth supported by the channel, poor equipment capabilities, and other features require special attention in developing various Internet services intended to be accessed by wireless devices. Chapter five addresses various aspects of physical layer of wireless channel for developing basic understanding of the problems, existing solutions and proposals for the future networks.

Internet security is a big challenge and is a prime issue for all Internet based technology (e.g. Grid and Cloud computing). Identification based on biological features is emerging as a foolproof solution to all kinds of security threats. Chapter six discusses Internet security using biometrics. WiMAX technology provides wireless Quality of Service QoS-enabled broadband access for fixed and mobile users. It is end-to-end and IP based and provides a rich set of QoS support for multimedia-based ubiquitous computing. The seventh chapter investigates the WiMAX architecture and the QoS support provided by the IEEE 802.16 protocol stack. This chapter also examines mobility management issues, end-to-end QoS, and current and future application areas of the WiMAX technology.

The present day transportation system makes uses of Internet for efficient command and control transfers. In such a communication system, reliability and on-time data transfer are critical. The sensor network supports streaming of multimedia and entertainment data from mobile to infrastructure network and vice versa in addition to the sensor information. The eighth chapter proposes a novel modeling method for the network and its traffic shaping. It also looks at the congestion control of packet loss using a differentially fed neural network controller. IPTV is an upcoming technology for audio-visual communication over the IP based network. Reliable data transfer is very important, more so as it is the transfer of real time data. Chapter nine proposes a model for reliability optimization in IPTV systems using Genetic Algorithms.

The Internet interconnects billions of small devices often limited in computational capacity, memory, and available energy and may suffer a high data loss rate when integrated into a network infrastructure. The tenth chapter describes the assumptions, technologies, and challenges for transmitting IPv6 over low power wireless personal area networks (LoWPANs). It addresses the key mechanisms from network aspects down to device design aspects. Mutual exclusion is one of the well-studied fundamental primitives in distributed systems. However, the emerging Peer to Peer systems bring forward several challenges to protect consistent and concurrent access to shared resources, as classical peer-to-peer systems like Napster, Gnutella, et cetera have been mainly used for sharing files with read only permission. Chapter eleven proposes a quorum based mutual exclusion algorithm, which can be used over any Peer to Peer Distributed Hash Table (DHT). The approach is an extension to traditional Sigma protocol for mutual exclusion in Peer to Peer systems.

Chapter twelve discusses Random Early Discard (RED) algorithm. This applies the technique of Active Queue Management (AQM) to prevent and control congestion and also to provide a range of Internet performance facilities. Chapter thirteen is the comparative study of the two models based on the two evolutionary algorithms, i.e. GA and PSO. It optimizes the path reliability of a flow in Cellular IP network.

The mobile device has nowadays become an important tool that can work as a gateway for the administrators to their visitors of the city. Chapter fourteen presents a method to process various environmental factors during a visit of the visitor and uses these factors as a context for presenting the recommendations. This chapter presents three main steps in the process of recommendation systems: collecting information, processing the recommendations, and presenting them in an attractive way. Focus of the chapter is the recommendations through augmented reality in order to provide an attractive tool for end users.

Growing Internet usage has invited to make the Internet pervasive so that it can be exploited to maximum possible extent. Today, the Internet is being utilized for multiple useful purposes. Chapter fifteen talks about making Internet pervasive via wireless mesh network.

A smart room is one that can adapt to the requirement from time to time. A semantic inference framework for a smart room has been designed in the last chapter of the book. It proposes a framework to provide useful and accurate information to users based on data collected from rooms in a building comprised of wireless sensor networks.

Overall, this book is a good collection of chapters comprised of useful research output towards the future Internet design.

Deo Prakash Vidyarthi
Jawaharlal Nehru University, India

Author(s)/Editor(s) Biography

Deo Prakash Vidyarthi received his Master’s Degree in Computer Application from MMM Engineering College Gorakhpur and PhD in Computer Science from Jabalpur University (work done in Banaras Hindu University, Varanasi). He taught UG and PG students in the Department of Computer Science of Banaras Hindu University, Varanasi for more than 12 years. He joined JNU in 2004 and is currently working as Associate Professor in the School of Computer & System Sciences, Jawaharlal Nehru University, New Delhi. Dr. Vidyarthi has published around 50 research papers in various international journals and transactions (including IEEE, Elsevier, Springer, World Scientific, etc.) and around 30 papers in proceedings of various peer-reviewed conferences in India and abroad. He has contributed chapters in many edited books. He is on the editorial board of two international journals and on the reviewer’s panel of many international journals. Also, he has co-authored a book (research monograph) entitled “Scheduling in Distributed Computing Systems: Design, Analysis and Models” published by Springer, USA released in December, 2008. Dr. Vidyarthi is the member of the IEEE, International Society of Research in Science and Technology (ISRST), USA, and senior member of the International Association of Computer Science and Information Technology (IACSIT), Singapore. Research interests includes parallel and distributed system, Grid computing, and mobile computing.


Editorial Board

  • Mohammed Najm Abdullah, University of Technology, Iraq
  • Raian Ali, University of Trento, Italy
  • Mohammad Anbar, Tishreen University, Syria
  • Kashinath Basu, Oxford Brookes University, UK
  • Lutfi M. Omer Khanbary, Aden University, Yemen
  • Zakaria Maamar, Zayad University, United Arab Emirates
  • Sattar B. Sadkhan, University of Babylon, Iraq
  • Sashikala Tapaswi, ABV - Indian Insitute of Information Technology and Management, India
  • A.K. Tripathi, Institute of Technology, Banaras Hindu University, India
  • Shekhar Verma, ABV - Indian Insitute of Information Technology, India
  • Yiyu Yao, University of Regina, Canada
  • Sherali Zeadally, University of the District of Columbia, USA