The Pervasive Computing field is almost always addressed from application, middleware, sensing or Human Computer Interaction perspective. Thus, solutions are usually designed at application level or involve developing new hardware. Although current layered network architectures (mainly TCP/IP stack) have enabled internetworking of lots of different devices… (More)
Traditionally, cellular wide area networks like UMTS are used as Internet access networks for particular users but, in some cases, they can be employed to provide Internet access to other smaller networks as well. The main inconvenient is that cellular networks have not the same bandwidth than wired networks and therefore, the cellular channel becomes a… (More)
Although current layered network architectures (mainly TCP/IP stack) have enabled internetworking of lots of different devices and services, they are neither well-suited nor optimized for the ubiquitous service provisioning required for the Future Internet. Hence, we firmly believe that we should have an underlying network architecture providing the… (More)
Cellular wide area networks like UMTS can be employed to provide Internet access to other smaller networks. The main inconvenient is that cellular networks have not the same bandwidth than wired networks and therefore, the cellular channel becomes a network bottle-neck. To help to mitigate this situation different optimization techniques exist, especially… (More)
Lack of flexibility of current Internet architecture led researchers to come up with new paradigms for a novel Internet architecture, which would be able to reduce complexity and increase flexibility compared to current Internet architecture. Functional composition is a promising approach to flexible and evolvable architecture design. The idea is composing… (More)
The abstract should summarize the contents of the paper and should contain at least 70 and at most 150 words. It should be written using the abstract environment.
In nowadays communication technologies, one of the main challenges to overcome is how to translate theoretical algorithms, designed protocols, existing hardware products from different manufacturers and the already knowhow into innovative applications that can produce a benefit for the user and for the commercializing firm. Following this topic, the present… (More)