Beruflich Dokumente
Kultur Dokumente
Computer Networks
journal homepage: www.elsevier.com/locate/comnet
a r t i c l e i n f o a b s t r a c t
Article history: Optical networks will change greatly over the next 10 years. This is because, if the current
Received 10 July 2007 growth rate is maintained, the Internet will have expanded 100–1000 times. Networked
Accepted 8 December 2007 wireless appliances, such as radio frequency identification (RFID) tags and wireless sensors,
Available online 18 March 2008
are expected to greatly outnumber PCs. Such exponential changes in network capacity and
terminals may lead to the emergence of post-IP networks. This paper introduces a candi-
date for a post-IP network called the ‘‘appliance defined ubiquitous network (ADUN)”,
Keywords:
which supports niche ubiquitous network applications for affordable implementation.
Optical network
Ubiquitous wireless network
The ADUN will demand optical networks that can transport 10–100 Gbps streams, each
Internet of which requires almost the full transmission capacity of one wavelength or a wavelength
Terabit LAN group. This paper discusses directions for the functional enhancement of optical network
Grid architecture, dynamically using wavelengths for grid computing, so as to support the
RFID ADUN.
DROF Ó 2008 Elsevier B.V. All rights reserved.
SDR
Disruptive innovation
1389-1286/$ - see front matter Ó 2008 Elsevier B.V. All rights reserved.
doi:10.1016/j.comnet.2007.12.013
H. Ichikawa et al. / Computer Networks 52 (2008) 1864–1872 1865
architectures. Therefore, the essential architectural change tions typically have terabit to petabit data size requirements
of the Internet is considered to depend on whether com- [4], and each data set should be transmitted within several
puters remain as the major terminals in the future. seconds or several tens of seconds. This section introduces
Passive or active radio frequency identification (RFID) the approach proposed in [2] that is designed to satisfy these
tags and wireless sensors are expected to be employed for requirements by using wavelength groups dynamically. We
networking real objects of the real world. If this approach call optical networks that employ groups of wavelengths
is implemented, such devices will become the major termi- dynamically from end to end ‘‘lambda access networks.”
nals, since the number of real objects is a hundred or a thou- An optical local area network architecture has been pro-
sand times greater than the number of PCs. Most of the posed [2], where terabit-class bulk data can be transmitted
devices are much weaker than PCs in terms of their func- with low latency in a dynamic manner. Fig. 1 shows an
tions. They will be power-sensitive and will not always example network configuration. The network consists of
operate at high speed. They provide functions for limited parallel optical interfaces, each of which is attached to
purposes. Once they constitute the majority of terminals, three components: a super-computer or a visualization
the networks, hereafter ‘‘ubiquitous wireless networks”, server; wavelength-banks, each of which provides required
will undergo essential changes in terms of architectures. wavelengths to each interface; and an optical switch,
This paper introduces a ubiquitous wireless network which connects an optical interface via optical fibers in
architecture leading to the post-IP network, and discusses the star configuration. It should be noted that the concept
its impacts on the optical network architecture supporting must include multiple switching nodes and not be re-
both the IP and the post-IP networks with much greater stricted to the star topology. The main characteristics of
bandwidths than those presently in use. It is often useful the network architecture, known as optical virtual concat-
for future network design to study extremely high-end enation, are (1) the assignment of an arbitrary number of
applications. As one of such network designs, Section 2 wavelengths to a bulk-data set for transmission according
introduces an optical local area network that can transmit to the latency requirement, and (2) the transmission of a
Terabit-class bulk data with low latency in a dynamic man- bulk-data set by dividing it into an arbitrary number of
ner for grid applications with super-computers [2]. Section blocks and passing the blocks across parallel WDM signals
3 reviews the history of disruptive network innovations. as virtually contiguous data. When a bulk data set arrives
The review points out that network architectures are at an optical interface, the transmitter requests the estab-
determined by terminals or appliances to be networked, lishment of optical channels on multiple wavelengths
and that optical networks should be designed accounting through the control plane, where the number of wave-
for the possible shift of appliances to be networked in lengths is derived from the latency requirement. The trans-
the future. In Sections 4 and 5, active RFID appliances are mitter divides the bulk-data set into parallel streams, and
introduced as the entry and the ultimate appliances for stores them in electronic buffer-memories until the reser-
the ubiquitous wireless networks, and the grand chal- vation is complete. If the optical switch finds a group of
lenges for ubiquitous wireless network deployment are available wavelengths, it sends a positive command and
discussed and summarized. In Section 6, we introduce an information about the wavelengths, either to the next opti-
approach to ubiquitous wireless network deployment cal switch (hop) or to the receiver, through the control
and show that this approach may lead to a post-IP net- plane. If the receiver accepts the positive command and
work. The approach introduces a new architecture, called information, it sends back an acknowledgement signal
the appliance defined ubiquitous network (ADUN) [3], with wavelength group information. The optical switch re-
where wireless radio spaces are virtually extended over ceives the acknowledgement, transfers this to the trans-
broadband networks to enable affordable implementation mitter, and then sets up the switch configuration.
of ubiquitous network applications. Broadband streams of The key physical technologies in the above network have
10–100 Gbps are transmitted over the ADUN. In order to been verified in a field demonstration [5]. A successful opti-
employ advanced digital radio signal-processing technolo- cal virtual concatenation of 32 km was achieved, where the
gies as far as possible, virtually extended wireless spaces wavelength group switching was implemented by an 8 8
should maintain the relationship between their corre- planar lightwave circuit (PLC) optical switch matrix, and the
sponding real spaces. This paper discusses the new wavelength group conversion was implemented by a polar-
requirements that this will impose on optical networks. ization independent waveband converter based on the qua-
These requirements are different from those imposed by si-phase – matched LiNBO3 (QPM-LN) waveguide.
grid applications. They indicate the progress direction of
the optical network as the basic infrastructure for both
the Internet and post-IP networks. 3. Possible disruptive innovation of ubiquitous wireless
networks
Super computer
Wavelength-bank
Storage Server
Optical frequencies
cally been determined by terminals or appliances. In the subsection, we can learn much about the terminal change
era of plain old telephone services, the terminals were tele- impacts from the deployment history of the Internet.
phone terminals, and the role of the network was to pro- Disruptive innovations were elegantly studied by Prof.
vide communication channels for voice communications, Clayton Christensen of Harvard University [7]. One of the
where a stable quality of 3.4 KHz bandwidth stream trans- disruptive innovations is the creation of the PC industry.
mission between the caller and the receiver was demanded The PC industry grew by using research and development
for each voice communication. As a result, the circuit results accomplished for mainframe and mini computers.
switching architecture was adopted for telephony net- For example, broad ranges of R&D were conducted for mas-
works. On the other hand, the end systems for the Internet sive fast disc systems, efficient in terms of cost per byte
are computers. Computers transmit bulk-data, so the pack- from materials to systems. Exponential improvement of
et switching architecture was adopted. disc technologies brought out disruptive innovation in
We can find the impact of the terminal change from the computer industries. In the early 1980s, the emerging
telephones to computers in the following architectural market of desktop personal computers was strengthened
principles of the Internet, summarized from the Internet using the 5.25-inch disc drives which failed to address
Architecture Board document [6]. The Internet technolo- the needs of the mini computer market at that time. The
gies have been designed and developed by paying much 5.25-inch drive was small and lightweight. Priced at
attention to these principles. around $2000, it could be incorporated into desktop ma-
chines economically. The personal computers in those days
1. The goal is connectivity. were targeted at the niche market of computer nerds, but,
2. The tool is the Internet Protocol. as is well known, eventually eroded the mainframe and
3. The intelligence is end-to-end rather than hidden in the mini computer businesses.
network. Disruptive innovation also occurred in the telecommu-
nication industries. Very long term preparatory efforts
The first principle demands that all the computers were made before the disruptive innovation as described
should be able to communicate with each other. All the in Fig. 2. The first packets were successfully transmitted
IP addresses are, in principle, known to all the computers over ARPA-NET in 1969. From that point, it took more than
connected to the Internet. Special arrangements are re- 20 years for the Internet to become commercially sustain-
quired if the communications should be restricted only be- able. TCP/IP protocol standards were developed and ap-
tween limited groups of computers. Different from the plied to the net in 1983. Important companies and
telephony network, other features of communications, organizations such as Cisco Systems, SUN Microsystems
such as quality, are given second priority. and the Internet technology standardization organization,
In the second principle, the Internet Protocol is a packet IETF, were established in these 20 years. The business
routing protocol, which is suitable for bulky data transfer model for the Internet Service Providers (ISP) was also in-
between computers. vented as seen in the creation of MCI ISP service. Vast
The third principle comes from the fact that computers amounts of government funds, from both DARPA and the
are powerful and flexible enough to implement services at NSF, were used for government-industry-academic collab-
the ends. This principle was very reasonable when the ter- oration, to provide the researchers and engineers of the
minals shifted from dumb telephone terminals to Internet with test beds where the Internet technologies
computers. could be developed, used for services, such as e-mail, and
improved.
3.2. Long term preparations for the disruptive innovation on Broadband network technologies, such as synchronous
the internet digital hierarchy (SDH) and wavelength division multiplex-
ing (WDM), contributed to the rapid growth of the Inter-
In addition to the impacts of the major terminal changes net, which was not intended by the investors in these
in the network architectures, as described in the previous technologies. Telecom industries made huge and long term
H. Ichikawa et al. / Computer Networks 52 (2008) 1864–1872 1867
Product Performance
DARPA“ NSF“
Universal Super n
VoIP/
Networking” Computing” atio Instant Messagin g
I n nov
g
Performance Demanded By t a inin (2000)
s
Su Napster(1999)
High-end Market WDM
e ion
s r u ptiv I
vat
nno Google(1998)
n
Di vatio stainin g
SDH o Su
PC In n
Performance Demanded By
WS Low-end Market
Mini-Computer, E-mail Web(1991), Archie(1990)
UUNET Commercial Service(1987)
TCP/IP, NSF Net/(Merit,MCI,IBM)(1983)
AT&T Divestiture1984) vBNS(95) MCI(00)
ARPA-net(1969) SUN Microsystems(1982) IIJ(1993) Time
Cisco Systems(1984)
investments in such technologies for so called broadband wireless bands of 2.4 GHz, 950 MHz, and 13.56 MHz, for
multimedia communications as advanced telecommunica- whether they could be used for container tracking. The
tions services. The developed technologies brought out dis- photo in Fig. 3 shows the scene of the test, where three
ruptive innovation, and the Internet is ultimately going to PCs display the tracked data using 426 MHz and 303 MHz
substitute for telephone networks. wireless bands for active RFID tags, and 953 MHz for pas-
The bandwidth of the Internet has kept growing rapidly sive RFID tags. The systems using the active RFID tags of
and has become powerful enough to even carry video 426 MHz and 303 MHz successfully tracked the container
streams. Such bandwidth is considered excessive, in some transfer, but passive RFID tags were proven to be inapplica-
sense, for e-mail and simple web access. Thus, we might be ble for container tracking. Based on this test result, the
at the beginning of another disruptive innovation. In the wireless band of 433 MHz was agreed to be used interna-
following, we will build a scenario of such disruptive tionally for container tracking with active RFID. A well-
innovation from the Internet towards ubiquitous wireless engineered 433 MHz version of the above described sys-
networks. tem was successfully tested by tracking containers from
the Hong Kong port to the Kobe port.
4. Appliances for ubiquitous wireless networks The black object attached to a PC in the photo of Fig. 4 is
an active RFID tag for another application system for inven-
As discussed in the previous section, terminals or appli- tory management. As a special type of inventory manage-
ances are considered to determine the network architec- ment, the system was built to monitor the position of PCs
tures. In this section, we introduce the active RFID within a building for information security protection.
appliances for commercial solutions and the experimental
wireless appliances for intelligent communications services
[8,9] as the entry and ultimate appliances of the future,
respectively. The applications of the former and latter wire-
less appliances are quite different, but both are equipped
with batteries and similar sensors. We think active RFID will
evolve into major appliances for future ubiquitous wireless
networks.
There have been many specific but economically useful
active RFID systems developed. An active RFID system for
international container tracking was developed, where an
active RFID reader was included in each container. The
reader reads the active RFID tags at each place the con-
tainer passes through, to collect the information on the
container traveled route. In addition to this, the reader
monitors the temperature and vibrations of the container
using its internal sensors. The collected data is kept in
the storage of the reader and retrieved afterwards. This
system was tested at the port of Kobe, Japan in January
2006. Passive RFID tags were also tested, using various Fig. 3. Experiment of international container tracking system.
1868 H. Ichikawa et al. / Computer Networks 52 (2008) 1864–1872
UHF
HF
LF Passive
Passive
Passive Short
IC Card
Immobilizer Range Devices
Common
915MHz USA
< 135KHz Use
869MHz Microwave Worldwide
WiFi
EU Regional
13.56MHz 2.45GHz
433MHz
5.2GHz Almost
EU
worldwide
US 5.8GHz
Japan
315MHz
953MHz
US
Japan
JAPAN
ers are installed, as is the case today. We need technologies 5.3. Technological innovation
that enable resources to be shared between applications.
Current technologies used for ubiquitous wireless net-
5.2. Security/privacy issues works are rather primitive. Innovative wireless technolo-
gies are expected to appear in the future for signal
Security and privacy issues should be carefully taken detection performance improvement, signal source loca-
into consideration with new technology deployment. Peo- tion, and so on. Wireless appliances will also be much im-
ple are particularly concerned with the power that tech- proved. Ubiquitous wireless networks should be able to
nology has for information distribution, in spite of the accommodate themselves to such technological innova-
fruitful contributions expected. tions. In addition, the ubiquitous wireless networks will
In the large scale deployment trials of passive RFID sup- be constructed over the Internet initially, so that efficient
ported by MIT Auto-ID center, which was the RFID stan- migration from the Internet should be taken into account.
dardization organization, some part of the trials were
prevented by a consumer group, Consumers Against Super-
6. Appliance defined ubiquitous network
market Privacy Invasion and Numbering (CASPIAN). They
made an objection against the attachment of RFIDs outside
6.1. Tools for making the infrastructure soft
shops to consumer products, such as safety razors, so as to
track the product lifecycles related to consumer private
Digitized radio on fiber (DROF) [10,11] is a technology
lives. It is believed that supply chain management perfor-
for transferring wireless space radio information to a re-
mance can be improved by substituting passive RFID for
mote receiver site, by digitizing the information and then
bar codes. RFID tags enable one to identify individual prod-
transferring it over broadband networks. DROF enables
ucts by assigning different identification numbers to the
us to locate receivers at the optimum sites with respect
individual products of the same category, while the same
to system construction and operating cost. It will be possi-
bar code number is assigned to all the products of a cate-
ble for operators to take care of many different users’
gory. By tracking each individual product, the whole lifecy-
receivers, as well as share receivers between users.
cle of the individual product can be managed, from its
Software defined radio (SDR) [12,13] is a technology
production to destruction. This was opposed by CASPIAN
with which to implement radio systems, using software in-
because the tracking could reveal the precise records of
stead of hardware circuits. Multi protocol readers employ-
consumers’ behavior, that is, it could compromise con-
ing SDR would be feasible if the required signal speed is
sumer privacy. This is very serious for passive RFID tag
not very fast. Fig. 7 illustrates a straightforward implemen-
deployment because the additional performance improve-
tation that makes the fixed broadband network universal
ment of the consumer product supply chain management
for wireless appliance systems by using DROF and SDR
becomes difficult by substituting RFIDs for bar codes.
technologies. Wireless spaces are essentially extended to
Active RFID appliances can collect much richer informa-
the receiver sites.
tion than passive RFID, so consumer privacy protection
should be considered mandatory in active RFID application
systems. Also, some typically expected applications relate 6.2. Architectural principles
to the security of our lives. It would not be easy for individ-
ual niche ubiquitous wireless network application systems To cope with the above challenges, we propose an
to satisfy the requirements of security and privacy with an architecture for ubiquitous networks called appliance de-
acceptable cost for users. fined ubiquitous networks (ADUN) with the following
1870 H. Ichikawa et al. / Computer Networks 52 (2008) 1864–1872
Protocol
Reader
IF or AD Broadband
Baseband C Network Decoder
Wireless
Wireless Space
Appliances Info. Storage
architectural principles, which are quite different from control of the owners. In other words, the ADUN net-
those of the Internet. work comprises private networks. In contrast, any
Internet host can send/receive packets to/from any
1. Networks with ADUN architecture speak the protocols other host. The hosts’ applications are responsible for
spoken by the appliances. Regarding current net- confirming that the packets they send to the hosts are
works, it should be noted that terminals/appliances the intended ones. Internet hosts cannot prevent the
have been designed to speak the protocols expected arrival of packets from malicious hosts.
by the networks. 4. Signals from the wireless spaces and appliances of dif-
2. Continuous radio information included in wireless ferent owners are internetworked by administrators
spaces, rather than individual wireless appliance sig- trusted by all the owners.
nals, is transported over the network. This means that
radio information streams are transported over the net-
works, while packets are transported over the Internet. 6.3. Architecture
3. Wireless appliances and radio signals received by
antennas have owners. Signals from the spaces and An owner’s view of an example ADUN network is shown
the appliances are received and processed under the in Fig. 8. There are two kinds of wireless appliances (WAP)
that are owned by individuals or used for public purposes. 6.5. Impacts on optical network architectures
WAPs are located in private or public spaces. Radio signals
in a certain frequency range in a private space are digitized The wireless space can provide rich information
and transported over a private wireless space network through the use of both real time and non-real time pro-
(WSN) to an information-sharing platform (ISP). The ISP cessing, as seen in the radio telescope field. The virtually
is operated by an administrator trusted by all the ADUN extended wireless spaces in ADUN should keep the rich
users. The digitized radio streams from the owner’s private information included in real wireless spaces as far as pos-
space are stored in a database, read by the owner’s deco- sible. This will need greater bandwidth than the above esti-
der, and used by the owner’s applications. To share his/ mation for ADUN with respect to the transfer, and will also
her own and public WSN with others, the owner allows impose additional requirements. For example, antenna
the ISP to use his/her WAP signal decoder. If a visitor is al- diversity is a technology for improving the performance
lowed by the owner to use the owner’s private WSN, the of receivers using radio information over multiple radio
ISP extracts the visitor’s WAP data by decoding the owner’s paths. In order to use this technology, virtually extended
radio stream and stores them in the visitor’s database. On radio paths should attempt to maintain the relationship
the other hand, if the owner is allowed to use someone’s between the corresponding real paths. For example, virtual
WSN, the ISP extracts the owner’s WAP data and stores radio paths with low latency will be required, but trans-
them in the owner’s WAP database in the same manner. mission delay stability and multi path synchronization will
The ISP also extracts the public WAP data and stores them also be demanded. These requirements are different from
in the public WAP database; every user is allowed to use those imposed by grid applications, but the two require-
the public WSN. A wireless space analyzer finds new infor- ments do not seem to be contradictory for future optical
mation by decoding and searching the stored data. For networks. The ADUN will be well supported by the lambda
example, the context of a certain owner’s WAP will be in- access architecture introduced in Section 2 with the appro-
ferred by decoding and searching other owners’ space data. priate modifications. However, more detailed studies are
needed.
6.4. Traffic generated by ADUN