Você está na página 1de 16

40 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO.

4, FOURTH QUARTER 2008

From TCP/IP to Convergent Networks:


Challenges and Taxonomy
Daniel F. Macedo, Aldri Luiz dos Santos, and Guy Pujolle

AbstractNowadays most portable electronic devices have without dropping the call. Yet, users will expect the same
some sort of network capability. However, due to different levels of service, even though the challenges to provide them
power, cost and processing limitations, the choice of networking will be much higher. Those services will demand protocols
technology changes for each device. Currently, networks are
converging to all-IP solutions, due to their wide applicability and that support dynamic addresses, bandwidth and others, due to
low cost. However, the IP architecture is built on several design the switch from one wireless technology to another, pushing
decisions that complicate the support of ubiquitous networking. even further the limits of IP networks. Further, terminals
In order to allow the equipment to intercommunicate even though employing several wireless cards might be connected to one
their protocols may be different, a new set of protocols and or more networks at the same time (multi-homing). Future
services have been developed. This article describes the challenges
and existing solutions in the area of convergent networking devices will choose which access network is best for each
protocols and architectures. First, we will explore why the application, or might even simultaneously use more than one
TCP/IP architecture is not tailored to mobile networks, briefly technology to serve a single service.
describing its limitations and possible solutions. Next, we will
The challenges are similar on public safety communications.
present a taxonomy to classify the architectures for convergent
networking. Finally, we show a brief survey of the existing In such situations, one or more teams of public service
convergent architectures as well as the research challenges on workers (e.g. firemen, police, army, medical services) combine
the subject. to act on some catastrophic event. As each group is inde-
Index TermsCommunication system operations and manage- pendently managed, they might employ different equipment
ment, Communication systems, Computer networks, Protocols. and networking standards. Similar to commercial convergent
networks, rescue operations will mostly demand multimedia
and real-time traffic, such as voice communication or video
I. I NTRODUCTION feeds of severely damaged regions [5]. The biggest difference
between regular convergent networks and networks for
D UE TO THE evolution of networking and electronics,
communication capabilities are nowadays implemented
into a huge set of devices, such as computers, PDAs, cell
rescue situations is the lack of pre-deployed networking in-
frastructure, since it may be destroyed, disabled or congested.
phones or even household appliances and smart tags [1]. Thus, a number of small ad hoc networks, interconnected by
Hence, users demand access to services and data anytime, means of a WAN backbone, will form a mesh network [6, 7].
anywhere. This vision requires the creation of a network which Due to the mission-critical nature of the work, the network
implements the services of both Internet and telecommuni- must be extremely reliable, requiring minimal or no human
cation networks, carrying data, voice and multimedia traffic. intervention.
This is known in the literature as convergent networking, Finally, networks are being used by things. Devices
next-generation networking or 4G networking [2, 3]. Telecom such as IP televisions and stereo sets, household appliances
operators are gradually offering packets of integrated data and and wireless sensors for home monitoring and environmental
multimedia services, which are branded triple play (Internet studies demand some sort of connection to the Internet [8].
access, television and telephony) and quadruple play (triple Some of those devices have severely constrained resources,
play plus wireless services) [4]. Those services demand an and thus cannot run IP [9], requiring either a simplified version
unforeseen amount of bandwidth and at the same time require of IP or a new networking architecture. Also, the location of
stricter QoS guarantees. the node is more important than its identifier, creating the need
To complicate things even further, operators will soon for service and data location protocols that use geographic
deploy a new pack of services known as penta play (quadruple information to identify the most suitable data source. Further,
play with seamless mobility among wireless technologies) [4]. the need for extremely low power consumption frequently
Terminals will be mobile, roaming from networks using dif- leads to cross-layer approaches or to radically new networking
ferent access technologies. For example, a user may start a architectures [1013].
phone call over GSM and next change to a WiFi connection To achieve the convergent networking vision, several capa-
bilities must be added to the existing networking infrastruc-
Manuscript received April 18, 2007; revised October 23, 2007.
Daniel Macedo and Guy Pujolle are with the Laboratoire dInformatique ture. First, in order to support user mobility, the network must
Paris VI, Universite Pierre et Marie Curie-Paris6, France, (e-mail: implement handover protocols and policies [14]. The unpre-
{Daniel.Macedo, Guy.Pujolle}@rp.lip6.fr). dictability of the wireless medium, coupled with unreliable
Aldri Luiz do Santos is with the Informatics Department, Federal University
of Parana, Brazil, (e-mail: aldri@inf.ufpr.br). devices and users, demands the design of new management
Digital Object Identifier 10.1109/SURV.2008.080405. and security solutions. Due to frequent changes in the access
1553-877X/08/$25.00 
c 2008 IEEE
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 41

network and on the environment, the network must be aware 1) IP addresses are used for routing and naming. As
of its context, adapting automatically and transparently to the Internet was primarily designed for fixed networks,
changes. As networks become pervasive, privacy and security IP addresses are used for routing and identification at
will be paramount. Critical networks, such as those used the transport layer. When we consider mobile hosts,
in surveillance and real-time control of industrial plants, however, addresses must change as users roam through
must be resilient to attacks from terrorists and competitors. networks with different administrative domains, due to
Meanwhile, personal devices and operators will have to adopt routing reasons. Since TCP flows are identified by a
privacy measures in order to avoid tracing the habits and the quadruple formed of IP addresses and ports, if a user
whereabouts of their users. changes his IP or the content migrates to another host,
Since IP networks are the de facto standard for com- the connection is lost. Mobile-IP solves this problem
munication, convergent architectures should be IP-based to by adding servers which forward packets to the cur-
facilitate their deployment. However, the IP architecture is rent location of the roaming nodes [15]. However, this
built on several design decisions that complicate the support issue would not exist if naming and addressing were
of convergent networking. This occurs not because of poor decoupled. Connections would be based on higher level
design, but because the overwhelming success of IP spurred names, which could be dynamically reassigned to new
the adoption of networking on devices and scenarios that addresses when necessary. Balakrishnan et al. go even
were impossible to imagine at the time of its inception. The further, proposing three levels of names in order to
requirements for mobile and ubiquitous access are not easily separate users/services, hosts and routes, allowing node,
fulfilled by current Internet technologies, because the Internet user and process mobility [16].
was developed for fixed, resourceful nodes that are always 2) The intelligence of the network is usually on the
connected to the network and export quasi-static services. edges. The Internet is based on the End-to-End (E2E)
Future networks, on the other hand, will be based on mobile principle, which states that the core network should
nodes, which will be at times disconnected from the network be as simple as possible, leaving the complexity to
and will provide services dynamically, depending on their the edge nodes [17]. Although the E2E principle al-
context. lowed the Internet to foster applications that could never
Due to those limitations, the research on convergent net- have been imagined when the network was designed,
working is divided into two directions. The first advocates the this rule must be violated in order to allow seamless
creation of new networking architectures more suited to the communication. Take, for instance, a user watching a
highly dynamic nature of current scenarios. The sheer amount video on a PDA over a WLAN. If the user goes out
of equipment and the cost of upgrading the entire Internet of range of the WLAN, the PDA might switch to a
demand a gradual deployment of innovative technologies. WAN network such as cellular. Some cellular networks,
Thus, next-generation network architectures will have to run however, are not IP-based, thus an intermediary node is
alongside IP while the infrastructure is gradually upgraded. necessary to translate IP packets to the most appropriate
Hence, the second direction defends that it is impossible to WAN abstraction. Intermediary nodes are recurrent on
replace the Internet, thus advocating incremental, backwards the Internet nowadays. Caches and NAT, for example,
compatible updates and patches. insert intelligence on the network at the expense of
This article provides an overview of convergent networking incompatibilities with other protocols: caches do not
and surveys the existing proposals. Our primary focus is work in conjunction with IPSEC and SSL, and NAT
on new architectures, however we briefly survey the most hinders the use of P2P applications [18, 19].
important enhancements to IP-based networks for convergent 3) The unpredictability of the wireless medium predates
scenarios. First, we will make the point for new network- layering. The Internet is based on a modular design,
ing architectures by describing the limitations of IP-based where each layer implements a specific service. While
networks when applied to convergent scenarios. Based on this modularity allowed IP to run over any existing
those shortcomings, we will develop a taxonomy that portrays MAC and PHY technologies, the separation of concerns
several design decisions on convergent networking. Next, we must be violated on wireless networks. One example is
will highlight the most prominent architectures and present TCP, which assumes that packets are only lost due to
some of the efforts to extend IP. Finally, we will show the congestion, because infra-structured links are highly re-
challenges and research directions on the field. liable. When a packet is not acknowledged, TCP reduces
its transmission rate in order to decrease congestion.
II. L IMITATIONS OF IP-BASED N ETWORKS
On wireless networks, however, link reliability may be
Networks are converging to all-IP solutions, and as such temporarily low due to interference. In such situations,
future networks will likely be based on IP or will use the TCP unnecessarily decreases the data rate, because the
IP infrastructure in order to profit from the hardware and protocol cannot differentiate transmission errors from
software already deployed. However, the Internet Protocol was congestion [20, 21]. Thus, TCP should interact with
not designed to support the applications and node dynamics the MAC layer to identify the cause of packet loss.
that users demand of convergent networks. We discuss below Another example is routing, where routes are based on
some shortcomings of IP when employed on mobile scenarios PHY issues such as packet loss rate and the energy
and how they could be solved. consumption of each link [22, 23].
42 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

probability of 1010 [30]. Meanwhile, wireless commu-


nication does not have such luxuries. Nodes might fail
due to depleted energy, low transmission quality (the bit
error rate can be as high as 103 [31]) or even because
a certain node on the path has moved and is now out of
range. Thus, wireless networks are prone to frequent ser-
vice disruption. Recently, the community acknowledged
that such networks demand different design principles,
Fig. 1. Requesting news on UK football, using the meta-data and the address- proposing the concept of Disruption Tolerant Networks
based approaches.
(DTNs) [32]. Examples are interplanetary networks or
sparsely populated networks [33, 34].
DTNs abolish connections in favor of bundles, which are
4) Data is usually bound to a host. On most Internet
messages that synthesize the entire request or response.
protocols, data is associated with the machine where it
Those networks are based on store-and-forward instead
is stored. FTP, HTTP and TCP are some examples1 .
of message passing, allowing nodes to communicate
For several types of information, however, users do
even if an instantaneous path to the destination cannot
not care about its source. Peer-to-Peer networks and
be found. As Figure 2 (a) shows, the nearest nodes to the
search engines, for example, are services that allow
destination (nodes in black) cache the bundles on perma-
users to query information based on its content or meta-
nent storage while the destination is unreachable [35].
data. Such services arose from the difficulty of finding
After some time, one of those nodes finds a valid
information on the Internet. Since those services are
route to the destination, due to movement or favorable
built over an address-based system, they are overlay
environmental conditions, as shown in Figure 2 (b). It
networks which map queries based on meta-data into
then forwards the bundle using the recently discovered
networking addresses and URLs.
path.
Several solutions, such as JINI, Salutation and others
6) Management is done outside the network. On the
were created to counter this problem [2426]. However,
classic Internet, a small number of nodes must be
since the underlying network makes requests based on
managed, and they tend to be reasonably simple to
addresses, service and data mobility is a big issue.
maintain. Thus, existing management solutions rely on
Whenever a service is inserted, deleted or moved, a
operators to remotely configure the behavior of the net-
lengthy notification process must be undertaken. All
work. With the connection of ubiquitous devices to the
nodes on the network that are using this service or
network (sensors, RFID, electronic appliances) and due
that cached its location must be informed of its new
to mobility, services and nodes are added and removed at
position. Another problem with content being bound
a much higher rate, making human-based management
to an address is that CDN-like mirroring requires a
impossible due to scalability and complexity factors.
non-trivial set of mechanisms, such as DNS redirects
Hence, management must be moved from the operator
and explicit content rewriting [27]. An approach that
to the nodes, creating self-managed networks. Those
counters those limitations is content-based routing, as
networks, which are also called autonomic networks due
in Directed Diffusion and Haggle [28, 29]. Since routes
to the use of the autonomic computing concept [36], em-
are based on meta-data, roaming services are handled
ploy intelligent software that monitors the conditions of
seamlessly. Moreover, if multiple sources for the same
the node and its surroundings, triggering configuration
data are found, the best source is selected by the routing
changes in order to avoid service degradation.
algorithm.
7) Nodes are assumed to be well-intentioned. On the
Figure 1 illustrates the difference between the two
Internet, data is transmitted without encryption, and
paradigms for a request of the latest news on English
connections are opened without authentication. This
football. Using the address-based approach, the user
behavior must be due to the restricted use of networking
must somehow find out the node where the information
in the 1970s, where the number of users and computers
is located and where it is logically stored. Thus, the
was small and access to the machines was easier to con-
user must be notified if the address or the location of
trol. Nowadays, those breaches are explored by spam-
the service changes. In a query based on meta-data,
mers and hackers to launch denial of service attacks,
however, users define which attributes the data must
send unsolicited messages or eavesdrop communica-
fulfill, and the underlying system takes care of finding
tions. In order to counter this, nodes should be assumed
the information. The service can be easily moved or
ill-intentioned unless proved otherwise. Applications
replicated, as content-based requests make no reference
should be secured, and the access to services and data
to the host of the information.
should be granted only to trusted parties.
5) Failures are assumed to be unusual. Equipment for
It is also necessary to protect the operation of the
fixed networks is extremely reliable. On an optical fiber,
protocol stack. A number of protocol security solutions
for example, one bit is transmitted erroneously with the
have been proposed. The use of puzzles on TCP, where
1 To get the file foo.bar on HTTP, for example, the user must know that it the connection is only opened after the client solves
is stored on host www.server.com, on the directory news. a computing-intensive challenge, is one example [37].
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 43

Fig. 2. Using node mobility to aid in message delivery, as in DTNs.

On routing, several works suggest the establishment network, in this case providing distributed content
of trust among nodes, where terminals monitor their search [40, 41].
neighbors in order to identify and isolate malicious Underlay-Based: New layers are inserted between
behavior [38]. On the MAC layer, the association to the existing layers. The communication between the
the network should be granted only for authenticated new layers and the existing ones follows the already
users [39]. established primitives. If new layers are inserted
above routing, the change is localized to edge nodes.
III. TAXONOMY New layers below routing can be added, provided
This section introduces a taxonomy based on the solu- that the new headers are removed or encapsulated
tions for the problems described previously. The taxonomy into TCP/IP packets when traversing legacy equip-
identifies if the architectures are tolerant of disruption and ment.
long delays. It also characterizes the number and type of Disruptive Design: The new architecture requires changes
addressing spaces employed, which influence how networks on some or all protocols and applications. The amount of
interconnect. The architectures are classified by their hier- change will mostly be dictated by which layers will be
archy, if they adhere to the end-to-end principle, and if redesigned, as higher layers are usually implemented only
they allow node and process mobility. Finally, the taxonomy on the edges of the network. Hence, the text below shows
encompasses management issues, such as the dependency on from the most disruptive designs to the less disruptive,
external management or if the network manages itself. We also starting from changes on the lower layers up to changes
included an assessment of the changes necessary to implement on upper layers. Due to readability issues, Figure 3
the architectures over IP-based infrastructure. Figure 3 shows indicates the number of the layer (in parenthesis) that
graphically the taxonomy. Some classifications are multiple was changed, instead of its name.
choice, meaning that a project might be classified into one or Clean Slate: Characterizes architectures where com-
more categories, while others are single choice. patibility issues are not considered on their design.
Degree of Change: This item classifies the degree of reuse The developer might change whatever he/she wants,
of existing technologies and equipment when deploying the hence the name clean slate.
new architecture. Greater reuse diminishes deployment com- PHY/MAC disruptive (L2): The architecture requires
plexity and costs. changes on the MAC level, thus existing hardware
IP-Based: The architecture supports the full range of must be replaced or its firmware must be repro-
TCP/IP protocols, thus minimizing change in core equip- grammed. This might occur in some or all nodes.
ment. It is possible, for example, to make changes only Routing disruptive (L3): Routing functions are
on the edges of the network. In order to retain compat- changed. Thus, in case of a large scale deployment,
ibility, new functions are added by the insertion of new the entire network must be updated.
communication layers. Transport disruptive (L4): Changes are made on the
Overlay-Based: A new network is created on the transport layer, requiring terminals to be upgraded.
application layer. P2P is an example of such a Application disruptive (L7): The applications must
44 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

Fig. 3. Graphical representation of the taxonomy.

be rewritten in order to adhere to a new communi- addressing for specific sub-domains, or to use a unique,
cation API/framework. more flexible scheme for the entire network.
Tolerance to Disruption: Indicates if the network tolerates One: All nodes have a unique address, defined using
frequent disconnections. In rescue situations, for example, a set of universally agreed upon criteria. Thus, since
node disconnections and packet drops are usual due to the addresses must appear only once on the network,
harsh environment. Another example is data delivery on their assignment must be coordinated in a distributed
sparsely connected networks, where a mobile node (also called fashion. Another issue with a single addressing space
data mule) makes opportunistic connections to other nodes in is that, if we interconnect limited devices with
order to deliver information [35, 42]. resource-rich ones, the employed solution will be
Always Connected: The architecture assumes that nodes dictated by the capacities of the limited devices.
are connected most of the time. Thus, nodes communicate Several: There are multiple addressing domains on
only if there is a path from source to sender. the network, which might be different from each
Disruption Tolerant: The network operates in scenarios other, allowing address reuse. However, translators
where node disconnection is frequent, allowing commu- are needed to allow communication among nodes
nication even if an instantaneous path from source to using different addressing rules.
sender does not exist. Type of addresses: Since addresses are used in routing,
Addressing: Defines how nodes will be identified. The issues they determine how information is sought on the network.
include the communication among domains with different Identifier-based: Nodes are identified by a sequence
addressing rules. Addressing is also tightly linked to routing of bits, thus if content migrates, routes are no longer
and network organization. The number of addressing spaces, valid. One example is the IP system, where connec-
in particular, defines if the architecture will demand nodes tions are established based on addresses. When a
that map addresses in one space into addresses into another, node changes its address, its connections are lost,
in order to allow inter communication among namespaces. thus requiring techniques such as Mobile-IP [15]
Number of spaces: Relates to the decision to optimize to re-route the communication. In order to find the
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 45

information sought, nodes must map the information Adaptive: Devices have some sort of intelligence, which
to an identifier, requiring the implementation of con- acts upon failures or changes in the network. The equip-
tent and service discovery middlewares [25, 26, 43]. ment is not completely autonomous, however part of its
Search engines, LDAP directories and P2P networks maintenance is automatic. The autonomic configuration
implement such services on the Internet. is guided by performance measures and SLAs (Service
Content-based: Addresses are associated to data, Level Agreements). Changes in the target performance or
based on their characteristics (meta-data). This al- in the SLA must be explicitly defined by an operator.
lows seamless mobility, since addresses are not Autonomic: Autonomic networks are self-managed net-
bound to a host. Also, there is no need for service works, where their behavior is defined by high-level busi-
discovery protocols, since the routing algorithm al- ness policies defined by an operator. These policies are
ready performs this function [28, 29]. automatically translated into lower level policies, adapted
Network Organization: Refers to the roles of nodes on to each piece of equipment. Based on those policies,
routing. Our notion of organization is different from that the network intelligently guarantees performance, fault-
of other authors, as we will show below. We chose this tolerance and security.
classification in order to identify the difference in hardware The classification in [36] included two more levels, called
and software on the nodes. basic and predictive. On the former, no management is em-
Flat: Any node can take part in routing. Note that, ployed, whereas in the latter systems correlate events and
for a given time, not all nodes might route data. Tilak propose actions, however their execution requires the approval
et al. [44] propose a different classification, where the of an operator. Those levels are omitted in this article because
network is hierarchical if a group of nodes route data for they do not represent any surveyed architecture. Due to the
some time, even if this group changes periodically. In high cost and complexity of managing several nodes using
our taxonomy, such networks are classified as flat. Since operators, networking architectures will evolve from managed
nodes have similar functions, such networks will have to adaptive, later reaching the autonomic operation. This
only one address space. classification can be considered on a per-feature basis, i.e.
Hierarchical: Nodes have pre-specified roles. Some of if a given network service is self-configuring, self-managed,
them produce or receive data, while others only forward self-optimized and/or self-secured.
data. Unlike flat networks, roles do not change over time. End-to-End: Indicates the transparency of the network, and
This type of organization is used on networks where some measures whether the network knows the semantics of the
nodes have limited resources, or in order to increase the applications. This knowledge enables the modification of the
scalability of the network. behavior and content of flows. Note that the introduction of
Hybrid: The network operates in both manners above application semantics on the network goes against the end-to-
at the same time. Examples are networks composed of end argument [17].
multiple domains with different node organizations. Transparent: The network knows nothing related to the
The organization depends mainly on the requirements of applications intentions or internals. Thus, it is said to be
node mobility. Static networks should be hierarchical, group- transparent.
ing nodes in a structure similar to that of the Internet. This Opaque: The network decides intelligently to modify the
structure allows routers linking two or more ASs (autonomous content of the communication based on some kind of
systems) to have routes based on prefixes, not on individual application knowledge [45]. Examples are aggregation,
nodes, significantly decreasing their routing table. On a flat caching and media transcoding [46, 47].
network, addresses may not change when a node moves, A transparent network is more generic and simpler, and
however routing will be harder due to the explosion of the thus may perform faster. However, it may not perform as
size in the routing tables. However, since addresses do not fast as an application-aware solution. Complete opacity is
change, node mobility is easier to handle. Mobile Ad Hoc not desirable either, as it becomes very difficult to manage
Networks (MANETs) are usually flat, since they are normally and to add new services. Thus, the biggest problem in the
small and mobile. design of opaque networks is how to balance the amount of
The future Internet will most likely be hybrid, in order to specialization. Usually, the network must only be aware of the
profit from the benefits of flat networks and to cope with key characteristics of a class of applications. One example is
local mobility, while using hierarchy to simplify routing on the classification of flows in link-layer QoS solutions. Instead
the network as a whole. of having a traffic class for each specific application, say
Degree of Autonomicity: This characteristic is related to the variable bit rate audio, link layer standards divide flows into
implementation of network management functions. We simpli- a small number of types, such as best effort and expedited
fied the classification proposed in [36], which characterizes a forwarding.
computing system according to its adequacy to the autonomic Type of Endpoint: Defines the level of abstraction of con-
paradigm. nection endpoints, which in turn restricts the seamless mo-
Managed: Devices implement management standards and bility of processes and hosts. We use the term seamless in
protocols, such as SNMP, allowing operators to remotely this article to indicate mobility without the establishment of
assess the conditions of the equipment and to reconfigure new connections. This definition is different from transparent
them remotely. mobility, which we define as the ability to hide the effects
46 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

of mobility from the user. Note that transparent mobility does The same principle applies to mobile nodes, where the host is
not imply on seamless mobility. One example is the AdaptNet the same, however the IP address changes. A third possibility
architecture, which ensures transparent mobility by proactively is the use of an alias. Each mobile station has a universal
opening TCP connections [47]. address, which is an alias for its instantaneous IP address.
Node mobility might require notification techniques, de- MobileIPv6 and its variants use this approach [15, 53, 54]. Due
pending on when endpoints are resolved to lower-level identi- to the use of aliases, those solutions suffer from triangular
fiers [45]. If the resolution occurs at the start of a connection, traffic, that is, data from the mobile node goes first to the ma-
in a process called early binding, packets are always directed chine that takes care of the alias, and then is forwarded to the
to the identifier previously resolved. Thus, when the moving mobile terminal. HMIPv6 and MobileNAT use multiple levels
endpoint changes its identifier, it must notify the other end- of indirection to decrease the amount of triangulation [53, 54],
point or leave directions on the old host indicating its new however this effect is still present in those solutions.
identifier. In the case of late binding, the mapping is made on The technologies above, however, do not deal with stations
a per-packet basis, and hence no notifications are necessary. roaming through heterogeneous access networks. Regarding
Address: Connections are tied to addresses. This is the mobility from different technologies, the IEEE working group
case of IP networks, where Mobile-IP allows a computer 802.21 will define standards to allow the handover among the
to change domains, however the mobile host must have 802 family of wireless protocols and 3GPP [55].
two addresses: the foreign address, used in foreign net- Another issue is the high overhead of IP on limited devices,
works, and the home address, which redirects incoming such as sensor networks. The LowIPv6 IETF group is creating
data to the foreign address [15]. a lighter version of IPv6 for IEEE 802.15.4 networks [9].
Node: Connections are tied to a node. In this case, nodes Since IPv6 requires a payload larger than the supported by
might change their address while keeping data transfers low power networks, LowIPv6 will define an adaptation layer
active (provided that the security policies on the new that converts IP packets to light IP packets. Further, the
domain allow the traffic). group will create a lighter version of AODV adapted to mesh
Entity: Connections are tied to a more abstract endpoint, networks of restricted devices [56]. The project will also define
which is bound to a host or address on demand, allowing management standards that are compatible with the Internet
software to migrate to other nodes without closing the management technologies and at the same time are suitable
existing connections. This type of mobility may be of for restricted devices.
use in scenarios where software migrates to a device more On the transport level, researchers proposed methods to
suited to the task [48]. counter the limitations of end-to-end congestion control. TCP
In the following section we use the proposed taxonomy to Westwood is an example, where the parameters of TCP are
classify the most important convergent networking proposals, tuned to wireless networks [57]. Since TCP performs poorly
after briefly describing each of them. on wireless links because it cannot differentiate congestion
from transmission errors, transport protocols should decouple
IV. C ONVERGENT P ROTOCOLS /A RCHITECTURES both functions. To do so, ATP, XCP and EXACT [20, 21, 58]
depart from the end-to-end paradigm, using queue estimates
This section surveys some of the convergent network archi-
from each hop to calculate the transmission rate.
tectures and presents their classification according to the pro-
To counter the lack of content and service aware addressing
posed taxonomy. We survey such architectures in the order of
on TCP/IP networks, several works propose overlay networks,
their creation, so the reader will be able to see their evolution
usually based on the P2P paradigm, to advertise and/or find
over time. We also include patches and/or overlay networks
services and content based on their meta-data [2527, 40, 41,
for TCP/IP networks, since there is a significant amount of
43]. Those overlays implement their own addressing and query
research focused on ameliorating the Internet architecture to
schemes on top of IP.
cope with novel services.

A. Overhauling the Internet Architecture B. The NewArch Project


Although the Internet has several design decisions that The NewArch project, developed by MIT, USC and Berke-
complicate the implementation of convergent networks, the ley, proposes a new architecture to the Internet [45]. Assuming
huge amount of equipment, knowledge and money spent on that the network could be redesigned from scratch, the authors
its deployment hinders the implementation of radically new devise a set of rules and principles that should guide the
solutions. Thus, several researchers proposed extensions and new architecture. These principles are implemented by the
modifications to the IP architecture to overcome its limitations. protocols FARA, RBA and XCP.
Several proposals try to counter the coupling of naming and FARA implements a new architectural model that decouples
addressing on IP networks by implementing a new naming routing and node identification [59]. In FARA, IP addresses
convention for connections [49, 50]. On those proposals, are broken into entity and association. An entity might be a
connections are not tied to IP addresses, but to names. Hence, node, thread, process, cluster and so on, while an association
the connection can be migrated or nodes might move as long maps a packet to a certain entity. This allows the mobility of
as their name remains unchanged. Another approach is the both ends of the flow among nodes or networks, simplifying
modification of transport protocols in order to transfer the the use of mobile agents. RBA (Role-Based Architecture) is
state of the TCP session from one node to another [51, 52]. a new approach to routing [60]. Since the Internet not always
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 47

obeys the principles of layering and network transparency, the security on the architecture, which is understandable, given
authors abolish layering and introduce roles. Each packet is the characteristics of the network. The validation is mostly
associated with one or more roles, which dictate how packets via simulations and analytical results, due to the cost and
are routed and treated inside the network. Each role, thus, can complexity of deploying testing equipment in the outer space.
be seen as a small program. With this abstraction, it is possible Although DTNs will not form the basis of a future Internet,
to insert middle boxes (firewalls, NAT, proxies) without vi- they will certainly be key in supporting ad hoc scenarios and
olating the architectural principles of RBA. As on the Internet, connectivity in poor countries.
routing is based on regions, however users might choose in
which regions the packets may or may not pass. XCP (eXplicit D. Plutarch
Control Protocol) solves the problems of TCP on links with
Crowcoft et al. take the opposite approach of NewArch.
high packet error rate and/or high throughputdelay product
The disparate capacities of networked devices, ranging from
by adjusting the data rate according to the available capacity
limited sensor networks to super-computers, preclude the
of the bottleneck link [21].
development of one single solution. Thus, as it is not possible
The strongest point of the architecture is XCP, a transport
to devise a new architecture that fits all conceivable scenarios,
protocol that was demonstrated to be much more efficient
the authors build an adaptation architecture, called Plutarch,
than TCP for a wide range of scenarios. Coupled with the
that enables the communication among different networking
new naming scheme of RBA, the architecture handles mobility
paradigms [63].
more efficiently than IP-based networks. It does not address
The Plutarch architecture interconnects heterogeneous net-
restricted devices, though, as it was not on its objectives to
works, allowing each domain to use the protocols that best
support such devices. The architecture is quite disruptive due
fit their needs. Gateways link networks with different contexts
to the use of roles, which would require the upgrade of every
(protocols or architectures) using interstitial functions, which
router.
map addresses and names from one context to another. The
C. IETF DTN architecture loosely defines the basic operations that must be
implemented on the gateways. Those were designed to be
Burleigh et al. proposed the Delay-Tolerant Network (DTN)
simple and generic, to allow Plutarch to operate over any
architecture for networks where the bandwidth delay prod-
network.
uct is high and/or node disconnections are frequent [32].
Plutarch is a very simple proposal that deals only with
Primarily designed for interplanetary communications, the
the interconnection of networks. The biggest importance of
concept also applies to underwater networking [61], ad-hoc
the architecture is the assumption that there will not be a
networks with sparse node connections [33, 62] and Internet
common convergence layer or architecture, as in IP, and
connectivity on third world countries, where data mules trans-
thus gateways should be used to connect different networks.
port data from/to Internet access points [42]. In order to cope
Since each network may operate differently, Plutarch does
with the large delays of space communication, DTNs adopt
not address QoS, management or security issues. However,
the message-passing paradigm. Protocols must be rewritten to
the network allows each sub-network to implement the most
conform to the DTN API, which requires all messages to be
appropriate solution to QoS and security. Another problem
self-contained. As an example, one FTP transfer would be
with the architecture is that it does not address session and
composed of two bundles: the request contains the file name,
terminal mobility.
password and the get command, while the response contains
the entire file.
The IETF DTN is an overlay network that interconnects E. The AdaptNet Project
interplanetary resources with traditional networks, as Figure 4 The AdaptNet project, developed at the Georgia Institute
shows. The network is hierarchical, based on domains. Nodes of Technology, implements what the authors call Next-fourth
or networks that use the same paradigm (for example, TCP/IP generation wireless systems, where nodes with heterogeneous
on Earth, or a circuit-based wireless link on Mars) form access protocols exchange multimedia content [47]. One of
domains, which are interconnected by DTN gateways. The its goals is to provide an evolution to IP-based networks,
inter-domain communication works as follows. The applica- requiring only modifications on the mobile nodes, using a set
tion issues a message, which is forwarded to the DTN gateway. of cross-layer protocols. The focus of their work is transparent
The gateway forwards the message through the proper DTN mobility. This is achieved using the R2 CP (Radical Recep-
domains (in Figure 4, it involves traversing a satellite relay). tion Control Protocol) transport protocol, which automatically
Whenever the bundle traverses a network, it is encapsulated adapts the coding of multimedia content in order to optimize
into the underlying networking paradigm. In TCP/IP, for the perceived quality of the stream. A medium adaptation
example, the message would be encapsulated into a TCP layer, located between MAC and routing, performs adaptive
flow. Since communication is based on message passing, the congestion control and coding.
issue of session mobility is not present. Nodes employ DNS- Node mobility is addressed at the transport level. Using
like names with late binding. Thus, the architecture supports signal level measurements, nodes approximate when they will
nomadic resources, as long as the name remains unchanged roam into other networks, so they open new TCP connections
between sessions. through the new base station before the handover is completed.
The IETF DTN group provides RFCs, code and simulations R2 CP switches its transport between the open TCP con-
demonstrating the concept. Currently, there is no QoS or nections, allowing a transparent handover to the application.
48 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

Fig. 4. Example of an IETF DTN network.

AdaptNet relies on technologies such as Mobile-IP to handle


IP addresses and reroute packets.
AdaptNet provides solutions to terminal mobility, however
the proposal does not seem to account for the interconnec-
tion of non-TCP/IP networks with the Internet, as it occurs
today with mobile phones that switch between Wi-Fi and
GSM/CDMA. It does not solve the problems of identification
and content-based search either, since the proposal does not
involve addressing. Further, QoS and security aspects were not
taken into account.

F. The WIDENS and MESA Architectures


Due to the recent natural catastrophes and terrorist attacks of
9/11, governments were encouraged to fund projects focused
on communication platforms for public safety, environment
and disaster situations in order to mitigate the lack of com-
Fig. 5. A WIDENS network. Red lines represent MANET links, while blue
munication tools tailored to first responders [64, 65]. lines indicate links on the mesh backbone.
The 9/11 incident unveiled that independent first responder
groups (firefighters, police, etc) could not intercommunicate,
due to regulatory and technological issues. First, each group
uses its own band of the RF spectrum. Second, the LMRs
(Land Mobile Radios) come from different manufacturers, ample) or the Internet. Thus, the WIDENS project consists of
and each manufacturer employs its own proprietary archi- a mesh access network [6] that interconnects several small ad
tecture. To counter those limitations, the US-funded initia- hoc networks to one another and to the Internet. The project,
tive called PROJECT 25 mandates the compliance to the however, does not allow disconnected operation of sections of
P25 standard [66], developed by TIA (Telecommunications the network. In case of a disconnection, nodes communicate
Industry Association). P25 standardizes digital and analog only other nodes on the same connected component.
technologies, in order to allow a smooth transition to all-digital The focus of the WIDENS project is on layers one to three,
equipment. The analog mode also acts as a fail-safe for the in order to provide a network for emergency communications.
digital mode. The project will also address QoS issues in the future, due
WIDENS (Wireless Deployable Network System) is a EU- to the critical purpose of the network. Since the project does
funded project involving industry and academia, focused on not intend to improve the Internet, but to provide means to
the design, implementation and validation of a high data-rate, interconnect to it, most likely the architecture will adopt IP
rapid deployable network for emergency response [67]. This naming and addressing.
project is part of MESA (Mobility for Emergency and Safety
Applications) [68], which involves European and American Currently, both TIA and ETSI (European Telecommu-
entities on the creation of a standard communication archi- nications Standards Institute) are partners on the MESA
tecture for public safety and emergency teams. A WIDENS project. Thus, a European-American standard for communi-
network consists of cells of ad hoc nodes, where one of the cation might emerge in the future. Due to the closed nature of
nodes acts as a back-haul to a wireless backbone, as shown in MESA, we can only speculate on the operation of the network.
Figure 5. This backbone may be connected to other networks, However, since the WIDENS project is a participant of MESA,
such as a private network (police or military network, for ex- we expect some similarities among the projects.
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 49

G. Ambient Networks the same time), multiple network interfaces on each device,
Ambient Networks (ANs) are All-IP networks consisting occasional connectivity, data security, search based on meta-
of several heterogeneous networks [69]. The project was data and resource discovery. The drawback of Haggle is that
launched from the vision of networks beyond 3G, where it is not IP-compatible, requiring the reimplementation of the
mobile users access multimedia content over a number of protocol stack on every mobile device. Haggle, however, takes
radio technologies. ANs employ a new IP-based layer called advantage of existing PHY and MAC layers, avoiding the need
ambient control space, which sits on top of routing. This layer for new client hardware.
solves the problems that arise from the interconnection of The architecture employs content-based routing and incor-
heterogeneous networks. All operations on the ambient control porates DTN concepts to profit from episodic connections
space are autonomic. Since ANs allow the composition of to route data among sets of isolated nodes. The architecture
larger networks without human intervention, the architecture provides autonomic discovery and dissemination of informa-
could also be used in emergency situations. tion and services. Haggle, however, does not provide any QoS
In order to provide a transparent communication to the guarantees. Data access in Haggle is made through a secure
application layer among different networking paradigms, the distributed file sharing layer, controlled using access control
ambient control space employs special edge nodes, called lists. Files are accessed through searches based on meta-data.
translators. Those nodes act as gateways, negotiating end-to- The secure access of information anywhere on the network,
end QoS parameters and repacking the payload to adhere coupled with content-based routing, allows applications to
to the conventions of each network. Translators can also act migrate to other nodes.
as content conversion gateways or transparent filters/caches. Haggles proposal is one of the few that embeds security
Translators allow each sub-network to employ the best pro- mechanisms. Due to the use of DTN concepts, there are
tocols for their operation, optimizing the communication on no QoS guarantees whatsoever. Further, the proposal tackles
the sub-net level, while the ambient control space takes most of the problems of wireless networking. One limitation
care of end-to-end QoS provisioning. Ambient networks use is the lack of interoperability with fixed networks and with
entity-based endpoints, called Bearers. Bearers abstract the the Internet. Since Haggle has been proposed for episodic
transport layer, thus an application flow might traverse several ad hoc networks, it does not address the issues of scale
connections. This flexibility allows the use of middle-boxes that a convergent network must face. However, the principles
and seamless node and process mobility, as connections can be of content-based routing, decision-making based on local
opened or closed on demand. Finally, since the communication information and built-in peer-to-peer like file sharing might
is broken into parts, each of them employing the protocols be employed on future convergent networks.
more suited to its domain.
I. Classification and Analysis of the Architectures
Figure 6 presents the logical structure of an AN-enabled
communication. The nodes at the extremity of domains A Table I classifies the architectures, ordered by the year of
and B work as translators for the connection between the creation, according to the proposed taxonomy. PROJECT 25
two bearers. The translator in A is connected to the Bearer is not listed since it is limited to MAC and PHY issues.
in A using the best set of protocols, which in this case is the MESA is also not included due to the limited amount of
suite formed by the red protocols. The two bearers open publicly available information. Other recent initiatives, such
a connection between themselves using the black protocols, as 100x100 [70], Stanfords Clean Slate [71], GENI [72],
which are the most suitable for this type of communication. FIND [73], CASCADAS [74] and ANA [75], are not surveyed
Packets coming from domain A are recoded upon their arrival in this article, since no publications are available at this
in domain B in a format understandable by the communication moment. The table also classifies the Internet, so readers can
stack used on this network, the blue protocols, and are then compare it against the new architectures.
forwarded to the bearer located in domain B. The table shows that more focus has been given to naming,
The Ambient Network project focuses on the autonomic since recent projects are centered on mobile computing. The
management and composition of networks. Thus, its main architectures propose naming schemes that are independent
contribution is its autonomic management plane, the ambient from the device hosting the information. Another recurrent
control space. The project also addresses terminal and appli- pattern is the interconnection of networks into one larger
cation mobility by decoupling identification and routing. No network using gateway nodes. As a consequence of multiple,
QoS or security aspects were evaluated at the moment. interconnected architectures, the whole network would have
several addressing spaces, using the type of addressing most
suited to each domain. On the Internet, IP integrates all the
H. The Haggle Project networks, forcing all the layers above to abide to a common
Haggle implements Pocket Switched Networks, which are communication paradigm. Gateways are more flexible, as they
autonomic networks of ubiquitous devices, such as PDAs, cell do not require both networks to standardize the higher layers.
phones and notebooks [29]. Haggle departs from the TCP/IP Hence, simpler networks communicate with complex ones
paradigm to create a new, message-oriented abstraction that without breaking the tenets of the architecture. This design
supersedes the file system, providing an API to create mobile allows each sub-network to employ the best protocol for
applications. the configuration of the sub-network. Sensor networks, for
Haggle supports multiple devices representing the same example, would use simple, energy-efficient protocols, while
user (e.g. John Smith uses a mobile phone and a PDA at more powerful nodes would use secure, QoS-aware protocols.
50 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

Fig. 6. Representation of the communication abstractions present in an Ambient Network.

TABLE I
C LASSIFICATION OF THE ARCHITECTURES IN THE TAXONOMY.

Degree of Tolerance to Addressing Network Degree of End to


Projects Year Endpoint
change disruption Number Type Organization Autonomicity End
circa Always Address,
Internet Unique Address Hierarchical Managed Transparent
19832 connected early
Always Entity,
NewArch 2000 Clean Slate Multiple Address Hierarchical Adaptive Opaque
connected early
L7 Address,
IETF DTN 2002 Tolerant Multiple Address Hierarchical Managed Transparent
disuptive late
Address,
Plutarch 2003 Overlay Multiple Hierarchical Opaque
Content
L2, L4 Always Address,
AdaptNet 2004 Unique Address Hierarchical Adaptive Transparent
disruptive connected early
Underlay Always Address,
WIDENS 2004 Unique Address Hierarchical Adaptive Transparent
and overlay connected early
Ambient L3, L4 Always Entity,
2004 Unique Address Independent Autonomic Opaque
Networks disruptive connected early
L3-L7 Entity,
Haggle 2006 Tolerant Unique Content Flat Autonomic Transparent
disruptive late

We also verify that most architectures do not support DTN, plane should be divided into two blocks. The knowledge
thus are classified as always connected. This might be sub-plane performs the first task, while the control sub-plane
justified by recent studies which show that it is always possible performs the last, using policies to configure the behavior of
to find two or more WiFi access points in range in crowded the algorithms [77].
areas [76]. Further, the architectures classified as disruption
Another issue in convergent networking is evolvability. Due
tolerant use the DTN concept to provide a backup form
to the large investment on IP equipment, most of the surveyed
of communication when the fixed infrastructure fails. Even
architectures limit their changes to the higher layers in order
in disaster situations, as in the MESA and WIDENS project,
to increase their compatibility with the equipment already
nodes are supposed to connect directly or indirectly to a WAN
deployed. Hence, disruptive solutions are discarded in favor
backbone.
of others that inter-operate with legacy solutions. Network
Concerning management, in general the proposals lean virtualization would allow the fast and cheap deployment of
towards the autonomic and adaptive levels. The architectures innovative designs [10, 78, 79]. In this architecture, several
normally use some sort of cross-layering to implement auto- networks would run over the same hardware, allowing the co-
nomic functions. Also, most architectures that implement self- existence of specialized networking protocols. This approach
management possess a vertical autonomic management plane. eases evolvability because virtual routers will support the
This plane has two functions. The first one is to analyze data testing and deployment of new networking concepts without
from the protocols and services running on the network to disrupting other virtual networks. Further, changing among
create meaningful information for the autonomic management technologies would be simpler, because the transition could be
algorithms. The second is to implement autonomic algorithms done gradually by running both solutions in parallel. Further,
and protocols that manage the network. Thus, the autonomic virtual routers could be used to deploy highly specialized
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 51

end-to-end solutions. For example, Internet-like protocols with order to simplify the development and testing of autonomic
loose QoS guarantees could run in parallel with protocols solutions, we must define processes to measure the depend-
tuned for cluster computing. ability of networks and their adherence to SLAs.
We did not evaluate the QoS aspects of the evaluated Security issues: Security and privacy issues are not a
platforms, due to the complexity of the theme, which would popular topic among convergent architectures, even though
deserve a survey of its own. Most projects, though, do not take they will be one of the cornerstones of future systems. Existing
QoS into account, focusing mostly on the problems arising work focus on the confidentiality and integrity of the data
from node mobility and the interconnection of different types flows, however they fail to address the privacy and the reli-
of networks. This subject remains as an open issue, as those ability of the devices. While existing solutions define trusted
described in the next section. and untrusted domains, node mobility allows untrusted nodes
to connect directly to an access point in the trusted region.
To complicate things, MANETs and sensor networks usually
V. O PEN I SSUES IN C ONVERGENT N ETWORKING
do not have a trusted certification authority, hence nodes must
This section presents some of the research directions pur- cooperate to establish trust [38]. Thus, new methods must be
sued by the convergent networking research community. We devised to refine the notion of trust on wireless networks.
briefly describe the most important architectural issues for Those methods should be based on the reputation of the nodes
convergent networks, focusing on areas which are not well based on their past behavior, as in the PGP system [84].
studied today. To avoid each application having to implement its own trust
Architectural issues: One important design decision on mechanism, a trust framework should be developed. This
convergent networks is whether employ a unified networking framework would free programmers from worrying about
architecture, or a junction of different architectures. Some specific details of the security solution, much as SSL does
researchers argue that it is possible to build networks that for e-commerce nowadays [84].
support everything from sensor nodes to super-computers. We Privacy will also be a big issue on convergent networks. If
could also build a network that is a concatenation of networks, a unique identifier is employed, it may be used to track the
each with protocols optimized to the characteristics of its location and habits of the users [85]. Complete anonymity is
applications. However, their interconnection may bring issues not desirable either, as the architecture should allow the iden-
similar to the ones faced by the Internet with NATs and fire- tification of criminals when a court approves the disclosure of
walls. Another issue is layering. Wireless networks demand a their identity [45]. Further, research on network privacy will
high level on inter-layer collaboration, challenging the existing be focused on closed traceability. On those systems, users
model. Thus, future research in convergent architectures will are normally anonymous, however the system has means to
continue the effort started by projects such as NewArch and disclose their past actions if authorized by an accredited entity.
Plutarch to redefine the layering model. The focus of this Finally, as shown previously, networks are more and more
redesign will be on new mechanisms to increase inter-layer opaque, due to the use of intermediate nodes. On secure
collaboration. applications, both sender and receiver must trust the inter-
Management and dependability issues: As described mediate node. Suppose a user wants to read a PDF file on
previously, convergent networks will be autonomic. In order his mobile phone. The intermediary node could convert the
to make networks as simple to use as the electrical system, PDF to a format suitable to the display on a phone. However,
where a device works by simply plugging it into the outlet, the intermediary might know what the user is reading and,
autonomic systems must employ open interfaces for querying if the book has some sort of digital rights management
and defining the configuration of nodes. Without standard- technology, it might store a copy of the users credentials.
ized interfaces, equipment from different vendors will not Thus, another topic of research will be how to ensure privacy
communicate with each other, limiting the adaptability of the in communications that traverse one or more intermediary
network. The IEEE 802.21 draft, for instance, is one step in the nodes.
definition of open interfaces in the context of handover among Context-awareness issues: This paradigm promises the
the 802 family of wireless technologies and 3GPP [55]. creation of services tailored to the user and his surroundings.
The second issue is how to manage heterogeneous networks One might create, for example, a notification service which,
automatically. This problem is complex, since the configura- depending on whether the user is on his car or on a con-
tion applied to each node must not interfere with the decisions ference, notifies him of an important event employing either
of others. Thus, nodes must take the state of their surrounding sounds or text. Context-aware frameworks and networks are
nodes into account. A global view of the network, although a burgeoning field [24]. Current work do not consider the
desirable, is unfeasible due to the large number of nodes. Thus, integrated design of convergent architectures, context-aware
future proposals will make decisions based on a limited view networks and autonomic networks, even though the three
of the network. One important challenge for those solutions components will be integrated into future networks. Those
will be the compromise of knowledge and complexity, as components share complementary goals, and thus collaborate
more information will increase the accuracy of the decision, with each other, as Figure 7 shows. Convergent networking
however demanding a higher resource usage. protocols, for example, adapt to network changes, but this
Little attention has been paid to the dependability aspects of decision depends on the collection of user and environmental
the communication, even though this topic has been identified conditions. Context-aware applications, on the other hand,
as a major research issue in computing [8083]. Further, in cannot operate separately from networking protocols, since
52 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

due to the lack of facilities and/or tools to evaluate large scale


heterogeneous architectures. Still, network operators will not
switch to an entirely new architecture unless it is reliable and
secure.
We also showed the research directions on convergent
networking. From those topics, the establishment of trust on
highly dynamic networks and autonomic network reconfigu-
ration stand out as the most prominent issues. Those efforts
will demand the standardization of onthologies and interfaces
to allow vendor interoperability.

ACKNOWLEDGEMENTS
We would like to thank CNPq, an organization from the
Science and Technology Ministry of Brazil, for partially
funding this research.

R EFERENCES
Fig. 7. Relationship among the technologies on convergent networks.
[1] R. Berezdivin, R. Breinig, and R. Topp, Next-generation
wireless communications concepts and technologies,
they dictate the current capabilities of the environment. Also, IEEE Commun. Mag., vol. 40, no. 3, pp. 108116, March
applications must be aware of when and how the environment 2002.
will change, thus they must communicate with the autonomic [2] S. Cherry, Nothing but net, IEEE Spectrum, vol. 44,
component. The autonomic component, on the other hand, no. 1, pp. 2226, Jan 2007.
must act based on information coming from the other two [3] K. Moerman, J. Fishburn, M. Lassere, and D. Ginsburg,
components. To accomplish this interaction, standard ontholo- Utahs UTOPIA: an ethernet-based MPLS/VPLS triple
gies and interfaces must be created to allow equipment from play deployment, IEEE Commun. Mag., vol. 43, no. 11,
different vendors to inter-operate. pp. 142150, 2005.
[4] L. Ouakil and G. Pujolle, Telephonie sur IP. Eyrolles,
VI. C ONCLUSION 2007.
The networking technologies of tomorrow will allow users [5] M. Voorhaen and C. B. (editors), WIDENS
to access their data and services wherever they are, no matter project deliverable 2.1: User requirements and
what type of device they use. Moreover, the network will first system architecture design, Information
provide a fair level of quality of service, even when users Society Technologies, Tech. Rep., 2006,
roam through different domains or access networks. This http://www.comlab.hut.fi/projects/WIDENS/D2.1.pdf.
network will have one or two orders of magnitude more [6] R. Bruno, M. Conti, and E. Gregori, Mesh networks:
nodes than the Internet of today, due to the introduction of Commodity multihop ad hoc networks, IEEE Commun.
new types of devices. Since the Internet has been designed Mag., vol. 43, no. 3, pp. 123131, Mar 2005.
with a completely different usage in mind, existing networks [7] I. Akyildiz and X. Wang, A survey on wireless mesh
are becoming ripe with patches and workarounds to counter networks, IEEE Commun. Mag., vol. 43, no. 9, pp. 523
its design limitations. Thus, a significant amount of research 530, Sept 2005.
groups are focusing on new networking architectures that [8] S. Teger and D. J. Waks, End-user perspectives on home
depart from the TCP/IP paradigm. networking, IEEE Commun. Mag., vol. 40, no. 4, pp.
This article provided an overview of the architectural as- 114119, 2002.
pects of convergent networking and a survey of the existing [9] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler,
proposals. We argued that the TCP/IP architecture has several Transmission of IPv6 packets over IEEE 802.15.4 net-
shortcomings when applied in convergent scenarios, as it works, IETF Draft.
arose out of a context where mobility and dynamicity were [10] The NSF Wireless Mobile Planning Group, New archi-
not an issue. Based on the limitations of TCP/IP and their tectures and disruptive technologies for the future inter-
proposed solutions, we devised a taxonomy for convergent net: The wireless, mobile and sensor network perspec-
networking and classified the current architectures. A survey tive, NSF Wireless Mobile Planning Group Workshop,
of the literature showed that there is not yet a proposal that Tech. Rep., August 2005.
stands out as the most suitable replacement for the Internet. [11] V. Srivastava and M. Motani, Cross-layer design: A sur-
Due to the complexity of the theme, existing solutions tend vey and the road ahead, IEEE Commun. Mag., vol. 43,
to specialize on some of the aspects of convergent networks. no. 12, pp. 112119, December 2005.
Autonomic management and support to seamless mobility are [12] M. Conti, G. Maselli, G. Turi, and S. Giordano, Cross-
present on most of the architectures, however most proposals layering in mobile ad hoc network design, Computer,
lack dependability, QoS and security aspects. This is partly vol. 37, no. 2, pp. 4851, 2004.
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 53

[13] I. F. Akyildiz, M. C. Vuran, and Ozg ur Akan, A cross- Internet Measurement (IMW), 2001, pp. 169182.
layer protocol for wireless sensor networks, in Annual [28] C. Intanagonwiwat, R. Govindan, and D. Estrin, Di-
Conference on Information Sciences and Systems, March rected diffusion: a scalable and robust communication
2006, pp. 11021107. paradigm for sensor networks, in Proc. sixth annual
[14] I. F. Akyildiz, J. Xie, and S. Mohanty, A survey international conference on Mobile computing and net-
of mobility management in next-generation all-ip-based working, 2000, pp. 5667.
wireless systems, IEEE Wireless Commun., vol. 11, [29] J. Scott, P. Hui, J. Crowcroft, and C. Diot, Haggle: A
no. 4, pp. 1628, August 2004. networking architecture designed around mobile users,
[15] A. Myles, D. B. Johnson, and C. Perkins, A mobile in Proc. Third Annual IFIP Conference on Wireless On-
host protocol supporting route optimization and authen- demand Network Systems and Services (WONS), January
tication, IEEE J. Select. Areas Commun., vol. 13, no. 5, 2006.
pp. 839849, June 1995. [30] The ATM Forum Technical Committee, 155Mbps Plas-
[16] H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, tic Optical Fiber and Hard Polymer Clad Fiber PMD
S. Shenker, I. Stoica, and M. Walfish, A layered naming Specification, ATM Forum, May 1997.
architecture for the internet, in Proc. 2004 conference on [31] Texas Instruments Inc., CC1000 - Single
Applications, technologies, architectures, and protocols Chip Very Low Power RF Transceiver,
for computer communications (SIGCOMM), 2004, pp. http://focus.ti.com/lit/ds/swrs048a/swrs048a.pdf, Sept.
343352. 2007.
[17] J. H. Saltzer, D. P. Reed, and D. D. Clark, End-to- [32] S. Burleigh, A. Hooke, L. Togerson, K. Fall, V. Cerf,
end arguments in system design, ACM Trans. Computer B. Durst, K. Scott, and H. Weiss, Delay-tolerant net-
Systems, vol. 2, no. 4, pp. 277288, Nov. 1984. working: an approach to interplanetary internet, IEEE
[18] R. Braden, D. Clark, S. Shenker, and J. Wroclawski, Commun. Mag., vol. 41, no. 6, pp. 128136, June 2003.
Developing a next-generation internet architecture, [33] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and
http://www.isi.edu/newarch/DOCUMENTS/WhitePaper. D. Rubenstein, Energy-efficient computing for wildlife
pdf, July 2000. tracking: design tradeoffs and early experiences with
[19] B. Carpenter and S. Brim, Middleboxes: Taxonomy and zebranet, in ASPLOS-X: Proceedings of the 10th in-
issues, RFC 3234, United States, 2002. ternational conference on Architectural support for pro-
[20] K. Sundaresan, V. Anantharaman, H.-Y. Hsieh, and gramming languages and operating systems, 2002, pp.
R. Sivakumar, ATP: A Reliable Transport Protocol for 96107.
Ad Hoc Networks, IEEE Trans. Mobile Comput., vol. 4, [34] Wizzy digital courier - leveraging locality,
no. 6, pp. 588603, November/December 2005. http://www.wizzy.org.za/, November, 2006.
[21] D. Katabi, M. Handley, and C. Rohrs, Congestion [35] Z. Zhang, Routing in intermittently connected mobile ad
control for high bandwidth-delay product networks, in hoc networks and delay tolerant networks: Overview and
Proc. 2002 conference on Applications, technologies, ar- challenges, IEEE Commun. Surveys Tutorials, vol. 8,
chitectures, and protocols for computer communications no. 1, pp. 2437, 2006.
(SIGCOMM), 2002, pp. 89102. [36] A. G. Ganek and T. A. Corbi, The dawning of the
[22] A. Woo, T. Tong, and D. Culler, Taming the under- autonomic computing era, IBM Systems J., vol. 42,
lying challenges of reliable multihop routing in sensor no. 1, pp. 518, 2003.
networks, in Proc. first international conference on [37] W. chang Feng, The case for tcp/ip puzzles, SIGCOMM
Embedded networked sensor systems, 2003, pp. 1427. Computer Communications Review, vol. 33, no. 4, pp.
[23] D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, 322327, 2003.
A high-throughput path metric for multi-hop wireless [38] S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating
routing, in Proc. 9th annual international conference on routing misbehavior in mobile ad hoc networks, in
Mobile computing and networking, 2003, pp. 134146. Proc. 6th annual international conference on Mobile
[24] M. Baldauf, S. Dustdar, and F. Rosenberg, A survey on computing and networking, 2000, pp. 255265.
context-aware systems, International Journal of Ad Hoc [39] T. Karygiannis and L. Owens, Wireless Network Secu-
and Ubiquitous Computing, vol. 2, no. 4, pp. 263277, rity: 802.11, Bluetooth and handheld devices, Computer
2007. Security Division, NIST, Tech. Rep. 800-48, November
[25] P. Bellavista, A. Corradi, R. Montanari, and A. Toninelli, 2002.
Context-aware semantic discovery for next generation [40] S. Androutsellis-Theotokis and D. Spinellis, A survey
mobile systems, IEEE Commun. Mag., vol. 44, pp. 62 of peer-to-peer content distribution technologies, ACM
71, September 2006. Computer Surv., vol. 36, no. 4, pp. 335371, 2004.
[26] S. Sivavakeesar, O. F. Gonzalez, and G. Pavlou, Service [41] J. Borg, A comparative study of ad hoc & peer to peer
discovery strategies in ubiquitous communication envi- networks, Masters thesis, University of London, August
ronments, IEEE Commun. Mag., vol. 44, pp. 106113, 2003.
September 2006. [42] R. C. Shah, S. Roy, S. Jain, and W. Brunette, Data
[27] B. Krishnamurthy, C. Wills, and Y. Zhang, On the use MULEs: modeling a three-tier architecture for sparse
and performance of content distribution networks, in sensor networks, in Proc. First IEEE International
Proceedings of the 1st ACM SIGCOMM Workshop on Workshop on Sensor Network Protocols and Applications
54 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008

(WSNA), May 2003, pp. 3041. [57] S. Mascolo, C. Casetti, M. Gerla, M. Y. Sanadidi, and
[43] C. Lee, A. Helal, N. Desai, V. Verma, and B. Arslan, R. Wang, Tcp westwood: Bandwidth estimation for
Konark: A system and protocols for device independent, enhanced transport over wireless links, in Proc. 7th
peer-to-peer discovery and delivery of mobile services, annual international conference on Mobile computing
IEEE Trans. Systems Man Cybernetics, vol. 33, no. 6, and networking (MOBICOM), 2001, pp. 287297.
pp. 682696, November 2003. [58] K. Chen, K. Nahrstedt, and N. Vaidya, Ieee wireless
[44] S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman, A communications and networking conference,, in IEEE
taxonomy of wireless micro-sensor network models, Wireless Communications and Networking Conference,,
SIGMOBILE Mobile Computer Communications Review, vol. 3, March 2004, pp. 19211926.
vol. 6, no. 2, pp. 2836, 2002. [59] D. Clark, R. Braden, A. Falk, and V. Pingali, FARA:
[45] D. Clark, K. Sollins, J. Wroclawski, D. Katabi, J. Kulik, reorganizing the addressing architecture, in Proc. ACM
X. Yang, R. Braden, T. Faber, A. Falk, V. Pingali, SIGCOMM workshop on Future directions in network
M. Handley, and N. Chiappa, New arch: Future architecture (FDNA), 2003, pp. 313321.
generation internet architecture, MIT/USC/University [60] R. Braden, T. Faber, and M. Handley, From pro-
College London, Tech. Rep., December 2003, tocol stack to protocol heap: role-based architecture,
http://www.isi.edu/newarch/iDOCS/final.finalreport.pdf. SIGCOMM Computer Communications Review, vol. 33,
[46] Y. Zhu and B. Li, Fault-tolerant interval estimation no. 1, pp. 1722, 2003.
in sensor networks, in Handbook of Sensor Networks: [61] I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater
Compact Wireless and Wired Sensing Systems. CRC acoustic sensor networks: research challenges. Ad Hoc
Press, 2004. Networks, vol. 3, no. 3, pp. 257279, 2005.
[47] I. Akyildiz, Y. Altunbasak, F. Fekri, and R. Sivakumar, [62] W. Zhao, M. Ammar, and E. Zegura, A message ferrying
AdaptNet: An Adaptive Protocol Suite for the Next- approach for data delivery in sparse mobile ad hoc
Generation Wireless Internet, IEEE Commun. Mag., networks, in Proc. 5th ACM international symposium
vol. 42, no. 3, pp. 128136, March 2004. on Mobile ad hoc networking and computing (MobiHoc),
[48] S. Chetan, J. Al-Muhtadi, R. Campbell, and M. Mick- 2004, pp. 187198.
unas, Mobile gaia: A middleware for ad-hoc pervasive [63] J. Crowcroft, S. Hand, R. Mortier, T. Roscoe, and
computing, in IEEE Consumer Communications & Net- A. Warfield, Plutarch: an argument for network plu-
working Conference (CCNC), Jan. 2005, pp. 223228. ralism, SIGCOMM Computer Communications Review,
[49] J. Ioannidis, D. Duchamp, and J. Gerald Q. Maguire, Ip- vol. 33, no. 4, pp. 258266, 2003.
based protocols for mobile internetworking, SIGCOMM [64] The United States Conference of Mayors, A national
Computer Communications Review, vol. 21, no. 4, pp. action plan for safety and security in americas cities,
235245, 1991. http://usmayors.org/uscm/news/press releases/documents/
[50] S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker, ActionPlan 121101.pdf, December 2001.
Host mobility using an internet indirection infrastruc- [65] Federal Communications Commission, FCC Homeland
ture, Wireless Networks, vol. 11, no. 6, pp. 741756, Security Policy Council, http://www.fcc.gov/hspc/.
2005. [66] Telecommunications Industry Association (TIA),
[51] A. C. Snoeren and H. Balakrishnan, An end-to-end Project 25, http://www.tiaonline.org/standards/
approach to host mobility, in Proceedings of the 6th technology/project 25/, October, 2006.
annual international conference on Mobile computing [67] H. Aache, V. Conan, G. Guibe, J. Leguay, C. L. Martret,
and networking, 2000, pp. 155166. J. M. Barcelo, L. Cerd, J. Garcia, R. Knopp, N. Nikaein,
[52] F. Teraoka, Y. Yokore, and M. Tokoro, A network X. Gonzalez, A. Zeini, O. Apilo, A. Boukalov, J. Karvo,
architecture providing host migration transparency, in H. Koskinen, L. R. Bergonzi, J. C. Diaz, J. Meessen,
SIGCOMM, 1991, pp. 209220. C. Blondia, P. Decleyn, E. V. de Velde, and M. Voorhaen,
[53] C. Castelluccia, HMIPv6: A hierarchical mobile IPv6 WIDENS: advanced wireless ad-hoc networks for pub-
proposal, SIGMOBILE Mobile Computer Communica- lic safety, in IST Summit 2005, 14th Mobile & Wireless
tions Review, vol. 4, no. 1, pp. 4859, 2000. Communication Summit, June 19-23, 2005, Dresden,
[54] M. Buddhikot, A. Hari, K. Singh, and S. Miller, Mobile- Germany, June 2005.
nat: a new technique for mobility across heterogeneous [68] TIA and ETSI, Project MESA - Mobile Broadband
address spaces, in Proc. 1st ACM international work- for Public Safety, http://www.projectmesa.org, October,
shop on Wireless mobile applications and services on 2006.
WLAN hotspots, 2003, pp. 7584. [69] N. Niebert, H. Abramowicz, G. Malmgren, J. Sachs,
[55] IEEE Standard 802.21, http://www.ieee802.org/21/, U. Horn, C. Prehofer, and H. Karl, Ambient networks:
December, 2006. an architecture for communication networks beyond 3G,
[56] C. Gomez, P. Salvatella, O. Alonso, and J. Paradells, IEEE Wireless Commun., vol. 11, no. 2, pp. 1422, April
Adapting aodv for ieee 802.15.4 mesh sensor networks: 2004.
theoretical discussion and performance evaluation in a [70] The 100x100 Clean Slate Project, http://www.
real environment, in International Symposium on a 100x100network.org/.
World of Wireless, Mobile and Multimedia Networks [71] Clean Slate Design for the Internet, http://cleanslate.
(WoWMoM), June 2006, pp. 918. stanford.edu/.
MACEDO et al.: FROM TCP/IP TO CONVERGENT NETWORKS: CHALLENGES AND TAXONOMY 55

[72] GENI - Global Environment for Network Innovations, gramme 6 - towards a global dependability and secu-
http://www.geni.net. rity framework, http://cordis.europa.eu/fp6/ist.htm, June
[73] FIND - Future Internet Network Design, 2006.
http://find.isi.edu. [83] Brazilian Computing Society, Grand research
[74] A. Manzalini and F. Zambonelli, Towards Autonomic challenges in computing in brazil - 2006-2016,
and Situation-Aware Communication Services: the CAS- Brazilian Computing Society, Tech. Rep., May 2006,
CADAS Vision, in IEEE Workshop on Distributed In- http://caracol.inf.ufrgs.br/ArquivosComunicacao/Desafios
telligent Systems: Collective Intelligence and Its Appli- ingles.pdf.
cations (DIS), June 2006, pp. 383388. [84] W. Stallings, Cryptography and Network Security: Prin-
[75] ANA: Autonomic Network Architecture, ciples and Practice. Pearson Education, 2002.
http://www.ana-project.org/. [85] D. Molnar and D. Wagner, Privacy and Security in
[76] Y.-C. Cheng, Y. Chawathe, A. LaMarca, and J. Krumm, Library RFID: Issues, Practices, and Architectures, in
Accuracy characterization for metropolitan-scale wi-fi Proceedings of the 11st ACM conference on Computer
localization, in Proceedings of the 3rd international and communication security, October 2005.
conference on Mobile systems, applications, and services
(MobiSys), 2005, pp. 233245.
[77] S. Davy, K. Barrett, S. Balasubramaniam, S. van der
Meer, B. Jennings, and J. Strassner, Policy-based archi- Daniel F. Macedo is a Ph.D student at Universite Pierre et Marie CurieParis
VI. He received a M.Sc. and a B.Sc. degrees in Computer Science from
tecture to enable autonomic communications - a position Federal University of Minas Gerais (UFMG), Brazil. Daniel participated in
paper, in 3rd IEEE Consumer Communications and the program comittee of IEEE ISCC 20062008 and ICWMC 2006 and 2007.
Networking Conference (CCNC), Jan 2006, pp. 590594. He received the Best Simulation Article award at IEEE ISCC05.
[78] T. Anderson, L. Peterson, and J. Turner, Overcoming the
internet impasse through virtualization, IEEE Computer,
Aldri Luiz dos Santos is a professor at the Department of Informatics of
vol. 38, no. 4, pp. 3441, April 2005. Federal University of Parana and was a visiting researcher at the Department
[79] N. Feamster, L. Gao, and J. Rexford, How to lease of Computer Science of Federal University of Ceara. Aldri received his
the internet in your spare time, SIGCOMM Computer Ph.D. in Computer Science from Department of Computer Science of Federal
University ofMinas Gerais, Belo Horizonte, Brazil. Aldri received both his
Communications Review, vol. 37, no. 1, pp. 6164, 2007. M.Sc. And B.Sc in Informatics from Federal University of Parana, Curitiba,
[80] National Science Foundation, Report of the Na- Brazil. He is member of the SBC (Brazilian Computing Society).
tional Science Foundation Workshop on Fundamen-
tal Research in Networking, http://www.cs. vir-
ginia.edu/jorg/workshop, January 2004. Guy Pujolle is a Professor at the Pierre et Marie Curie University (Paris
6) and scientific advisor of Orange/France Telecom. He received the Ph.D.
[81] The British Computer Society, Grand Challenges and Th`ese dEtat degrees in Computer Science from the University of Paris
in Computing, http://www.nesc.ac.uk/esi/events/Grand IX and Paris XI, respectively. He was Professor and Head of the computer
Challenges/, 2004. science department of Versailles University. He was also Professor at ENST
(Ecole Nationale Superieure des Telecommunications) and member of the
[82] Community Research & Development Information Ser- scientific staff of INRIA. He is currently an editor for International Journal
vice, Information society technologies framework pro- of Network Management, WINET, Annals of Telecommunications, and IEEE
Surveys & Tutorials.

Você também pode gostar