Preview

The X-Internet: Connecting the Physical World with the Cyber World

Powerful Essays
Open Document
Open Document
4351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The X-Internet: Connecting the Physical World with the Cyber World
w h i t e p a p e r
JUNE 2006
The X-Internet
Connecting the Physical World with the Cyber World contents 3 E xecutive Summary
4 I ntroducing the Future: The Extended Internet
5 T echnologies Enabling Seamless Mobility in the
X-Internet World
5 A dvanced, cooperative wireless technology
5 Context awareness
5 P eer-to-peer awareness, self-organization and autonomous action
7 E nergy efficiency and self-generation of power
7 New form factors
8 T he X-Internet Architecture
8 Standards
8 Built-in intelligence
8 A dvanced data interpretation
8 E xception-based control
9 Security and privacy
9 IP v6 addressing
10 T he Opportunities
10 I magine the Possibilities
11 A bout the Authors the x-internet
Executive Summary
In just 20 years, the Internet has fundamentally changed the way we live, learn, do business and entertain ourselves. What makes the Internet so revolutionary is that it provides a standard way for people to connect anywhere around the world.
Now, the Internet is entering a new generation of Seamless Mobility, thanks to affordable mobile devices that take advantage of new options and increased coverage for wireless connectivity. Standards-based wireless technologies and infrastructure are growing at a rate that promises to completely remove all remaining barriers to truly seamless personal interaction and knowledge transfer.
But even a ubiquitous wireless Internet isn’t the complete fulfillment of the
Seamless Mobility revolution. Today’s Internet connects people to people, providing information in text, video, sound and other formats intended for use by people. The next step is to Internet-enable physical objects — connecting people with things and even things with things.
The Extended Internet, or X-Internet, will enable connectivity not just between people and their computing devices, but between actual, everyday things like windows, highways, bananas, pets, appliances and more. By enabling connectivity for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The two most negative comments about Qayyum’s ideas came from Safie and Danial. Safie stated that the Fleet Maintenance Division is doing just fine as it is and that one should not “try to fix something that isn’t broken.” Danial commented that REX SDN BHD should not “jump the gun on videoconferencing; it is too early to invest in that new technology.”…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The internet technology has become one of the most important forms of technology there is. It has come a long way from a research project funded by the American Department of Defense called ARPAnet, designed as a back-up system that could withstand a nuclear attack: if a bomb fell on part of it, the rest should keep working. One could never imagine a world without the internet, where information is just within your fingers. You can find anything from phone numbers to the scientific name of the zebra with just a few strokes on the keyboard.…

    • 706 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Rocket Internet Case Study

    • 2714 Words
    • 11 Pages

    HOW CAN ROCKET INTERNET TRANSFROM ITS “FIRST FOLLOWER ADVANTAGE” INTO A LASTING COMPETITIVE ADVANTAGE IN EMERGING INTERNET COUNTRIES?…

    • 2714 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Online Technology

    • 333 Words
    • 2 Pages

    Some of these critics tell us that contrary to popular belief, "far from making us smarter, online technologies are actually making us dumber." (Gerald Graff and Cathy Birkenstein. 2006, 168) On the other hand, there are people who challenge this school of thought; they bring up the point that students are able to find a target audience and tweak their writing to appeal to their directed audience because of the use of social media. This whole time the author's advice or opinion on the use of technology had not been mentioned. The information and view points were told to explain the idea from a completely objective stand point. That is however, until the very last paragraphs of this chapter. Graff and Birkenstein give their own view in reference to their combined 70 years of teaching, they do not agree with either side of the argument.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    II. Central University Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions. The best way to address the following issue is to first identify the network requirement for Central University. The establishment of the solution must consider the various buildings, and departments as well as future growth expectation. When establishing a large network between buildings and departments, it is essential for the network manager to identify what parts of the network are available, requiring upgrades, and or facilitates space for additional equipments. The first assumption is that every building has sufficient routers, switches, and network fabric to handle the traffic on this scale. Acquiring subnets for privacy to keep frivolous student traffic off their subnets along with maintaining the faculty and staff on separate subnets for privacy. These subnet breakdowns will not be sufficient enough. Using Dynamic Host Configuration Protocol servers to assign individual IPs and alleviate the issue of having to assign static IPs to people will be the right choice for securing, and facilitating the…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Internet (Arpanet)

    • 805 Words
    • 4 Pages

    An experiment that was funded in 1968 by the United States of Defense was soon called the internet. This was called ARPANET, which originally connected the Stanford Research Institute, UCLA, UC Santa Barbara, and the University of Utah. ARPANET was to promote network research.…

    • 805 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In the concept of computer network engineering the term RFC refers to a published memorandum by the Internet Engineering Task Force (IETF). This is an informative document that provides information on such items as current research, important new innovations, methods and other aspects relative to the working of the internet and connected IT systems. The idea was designed by Steve Crocker in the late 60’s. This has since been adopted to contain the official records for development specifications for the internet, improvement of protocols and notification of important related events.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet Technology

    • 4775 Words
    • 20 Pages

    INSY402 S.A.Idowu email:saidowuclass@yahoo.co.in 1 Lesson1,2 and 3  Internet   Network Edge Network Core  Core Network Switching Schemes   Circuit Switching Packet Switching (pipelining)  Network Delay     Nodal Processing Delay Queuing Delay Transmission Delay Propagation Delay 2 OSI 7-Layer Model In the 70's, computer networks were ad hoc, vendor-specific Open Systems Interconnection model     developed by the ISO (International Organization for Standardization) in 1984 provides an abstract model of networking divides the tasks involved in moving information between networked computers into 7 task groups each task group is assigned a layer Each layer is reasonably self-contained, so   can be implemented independently changes/updates to a layer need not effect other layers 3 Protocol Layers • • • • • • • Application layer – describes how applications will communicate e.g., HTTP, FTP, Telnet, SMTP…

    • 4775 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Virtual Computing

    • 573 Words
    • 2 Pages

    In the world of virtualization there are two kingpins; VMware and Microsoft. As I researched these two vendors it has become apparent that comparing these two giants would be like comparing apples and oranges; like apples and oranges are fruit, and VMware and Microsoft make virtualization software, they are different altogether. This happens to be the scenario that I have seen, not only between the two companies, but in blog posts and forums.…

    • 573 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber

    • 1224 Words
    • 5 Pages

    You are, in effect, my team of researchers undertaking some relevant research of benefit to your own learning experience and future employment and research.…

    • 1224 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Unregulated Cyber World

    • 374 Words
    • 2 Pages

    In an unregulated cyber world, violence and pornography can bring serious consequences for children. And the intention in promoting so-called global Internet freedom was actually to help people get around barriers in cyberspace. But no country can afford to make the Internet absolutely free. Anyhow, it is quite obvious that regulation/controlling/censoring Internet for kids in some aspects is possible. People shouldn’t estimate this act as a crime against the freedom, but as a freedom from crime. For example, in China, according to “The State Control approach” all Internet cafes are required to keep records of sites visited, with the aim of preventing access to sites featuring pornography, gambling and those that "harm national unification, sovereignty and territorial integrity". Moreover, they even managed to block Facebook, Youtube and Twitter. Government, of course, should act as regulator, but what then of parents? While an Internet service providers might be tasked with being more careful in respect of content provision, there was a role for parents and educators too: parents need the skills and knowledge to regulate content in their own home. Internet users, especially parents and teachers, can use filtering software, which alone or in conjunction with the self-rating of sites can limit access by particular users to particular parts of the Internet. Parents should take greater responsibility for what their children get up to on the internet. Of course, it would help parents and others with responsibility for children if they could buy a PC with filtering software pre-installed and set at the maximum level of safety and if the default setting for all web browsers was a child-safe mode. Then adult users of such hardware and software would have the opportunity, when they wished, to switch to a less filtered or completely open mode. The Internet cannot and should not be regulated like ‘old’ media. However, more can and should be done, especially in relation to…

    • 374 Words
    • 2 Pages
    Good Essays
  • Better Essays

    ICT play a central role in society today from businesses that depend on computers and communication networks to run efficiently to the everyday individual who wants to keep in contact with friends and families from afar. The European Commission defines ICT or Information and Communication Technology as all technical means used to handle information and aid communication . It is similar to Information technology or IT as it is commonly referred to but focuses primarily on communication technologies. This includes the Internet, wireless networks, mobile phones, and other communication mediums. Technology is the application of scientific knowledge for practical purposes, especially in industry. Technological advances mean faster ways of communicating are being developed all the time.…

    • 1040 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Data Link Control (Internet)

    • 2789 Words
    • 12 Pages

    Society has become based solely on the ability to move large amounts of information across vast distances quickly. The natural evolution of computers and this need for ultra-fast communications has caused a global network of interconnected computers to develop. This global network allows a person to send E-mail across the world in mere fractions of a second, and enables even the common person to access information world-wide. With the new advancements in technology there must be a set of "rules" or better known as protocols that must be established and utilized at all times. In this short ten page paper I will be demonstrating the advancements in these protocols and there uses today.…

    • 2789 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    What exactly is the "Internet"? Imagine millions of computers all around the world linked together and exchanging information. The Internet is a global network made up of thousands of smaller networks. The Internet is like a huge town. If you wanted to send or receive mail you have an electronic post office. There are also libraries you can use any time you want, with millions of books and magazines and newspapers. Chat rooms are like the schoolyard or lunchroom except you can talk to people anytime you want. And on the World Wide Web, you can play games and listen to music (What is the Internet?).…

    • 1069 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The internet is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. From work to school, living room to shopping malls and restaurants, internet follows us everywhere and has become an essential part of our lives and in today’s world, life without internet cannot be imagined. In short, the internet has conquered every field of life like education and social networking. And like most of the technologies, it has both advantages and consequences.…

    • 422 Words
    • 2 Pages
    Good Essays

Related Topics