What Happened to Preferences for Next Generation Internet?

Author(s):  
Wen-Lung Shiau ◽  
Chen-Yao Chung ◽  
Ping-Yu Hsu

The growing popularity of the Internet has resulted in attracting many enterprises to do business transactions over the Internet. The current Internet protocol version 4 (IPv4) has been used for over 20 years. Even though IPv4 applications have been quite successful, it faces a problem of shortage in IP addresses, ineffective security mechanisms, and a lack of service quality management, etc. Scientists and engineers have devoted considerable effort to the development of next generation Internet protocol version 6 (IPv6), which is the core component of Next Generation Internet (NGI) to meet the future requirements of the Internet. Even though NGI is technically superior to the traditional Internet and is being established worldwide, few people have transmitted data through it. According to the Innovation Development Process in the Diffusion of Innovation theory, IPv6 is currently in a stage of technological diffusion. The research studies whether educating potential customers with more IPv6 knowledge created in the innovation process can increase their preference for the technology. With surveys collected from 596 undergraduate students, the results show that knowledge of the commercial applications of IPv6 in mobile communications and information appliances significantly contributes to a preference for the IPv6 technology.

Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


Author(s):  
Azizul Hassan

Augmented reality (AR) offers an interactive experience of the real-world environment when an object of the real-world is augmented by computer-generated perceptual information and relevant artefacts. This is a conceptual chapter based on the review of available literature. Also, resources on the internet have also been accessed and reviewed. On the context of the Diffusion of Innovation theory, this research aims to outline AR guiding for in an airport used for tourist aviation. Biman Bangladesh Airlines, the national flag carrier of the country, is the example where this study also explains the possible challenges and benefits that AR guiding facilities can possibly have. This research outlines two specific areas of management and marketing issues are analysis on the way to implement such guiding. Findings show that from the understanding of the Diffusion of Innovation, AR guiding in these days is adopted by an ‘Early Majority' who are followers and engages in reading those reviews given by the previous adopters of new services or products.


First Monday ◽  
2016 ◽  
Author(s):  
Joo-Young Jung

Guided by diffusion of innovation theory, this study compares patterns of connectedness and disconnectedness to the Internet and traditional media within and across select age groups (20–39, 40–59, and 60 or over) by conducting a randomly sampled survey in Tokyo, Japan. The oldest age group fell behind younger age groups not only in regards to ownership and access, but also the scope and intensity of Internet connectedness. Within age groups, disparities in Internet connectedness was found in the oldest age group, while disparities in connecting to television, newspapers and radio was found in the youngest and middle age groups. Mass media connectedness was found to have a negative relationship with PC Internet connectedness in the oldest age group. Implications for the evolution of media connectedness and disconnectedness across different generations are discussed.


2019 ◽  
Vol 52 (5-6) ◽  
pp. 338-353 ◽  
Author(s):  
Murat Aydos ◽  
Yılmaz Vural ◽  
Adem Tekerek

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.


Author(s):  
Paramesh C. Upadhyay ◽  
Sudarshan Tiwari

Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.


Author(s):  
Ying Liu ◽  
Jianping Wu ◽  
Qian Wu ◽  
Ke Xu

The Internet has become a major part of the global communications infrastructure supporting modern-day socio-economic development, social progress and technological innovation. Invented 30 years ago, today the Internet is facing severe challenges. Many countries have funded research projects on the new-generation Internet, such as GENI, FIND, FIRE and CNGI, in an effort to solve these challenges. In addition, over the past few years, the networking research community has engaged in an ongoing conversation about how to move the Internet forward, and there are now two different approaches towards Internet research. The first approach is based on using the existing Internet architecture to solve the major technical challenges—this is called ‘evolutionary’ research. The other, which is called the ‘clean slate’, involves the design of an entirely new Internet architecture. In the first part of this paper, the basic features of the next generation Internet and its principal contradictions are analysed. Then a survey of recent progress in the study of the next generation Internet in China is discussed. Finally, the focus and direction for the next step in research are presented as based on fundamental research into the international next generation Internet architecture, and the many new innovative demands placed on Internet architecture in recent years.


Sign in / Sign up

Export Citation Format

Share Document