<p>Foreword<br>Preface<br>Acknowledgements<br>1. On the Way to the Pervasive Web <br>1.1 The Net, a Tool for Everyone 1.2 The Inexorable Transformation of Internet applications 1.3 The Application’s Mutiny 1.4 Everything on the Move 1.5 New Interaction Paradigms Emerge 1.6 The Scent of Pervasive Applications 1.7 The Billion Dollar Question.- References.<br>2 The Network, as We Know It <br>2.1 The Multiple Facets of Networks 2.2 Networks from the Eyes of an Ordinary User 2.3 Invite a Programmer to Understand What’s in the Cloud 2.4 A Network Engineer to Turn a Switch into a Router 2.5 The Computer Science of a Router 2.6 Simple Math to Stabilize the Net 2.7 Life of a Commuter 2.8 The Three Fundamental Principles.- References.<br>3 Six Problems for the Service Provider<br>3.1 The Net has Ossified 3.2 Problem 1: Not Truly Ubiquitous 3.3 Problem 2: The Unresponsive Net 3.4 Problem 3: Too Much, Too Stale Signaling 3.5 Problem 4: Lack of Parallelism 3.6 Problem 5: Data Agnosticism 3.7 Problem 6: Inadequate Net-search Engine 3.8 Concluding Remarks.- References.<br>4 Spontaneous Networks<br>4.1 The Gift of Ubiquity 4.2 Spontaneous Connectivity 4.3 The Hidden-terminal Problem 4.4 The Exposed-terminal Problem 4.5 Preventive Measures to Avoid Collision 4.6 Path Discovery in a Volatile Network 4.7 The KISS Approach.- References.<br>5 Reactive Networks<br>5.1 Why Networks on Demand? 5.2 A Traffic-free Network 5.3 Our First Path 5.4 Path Management 5.5 Our Second Path 5.6 Global Synchronization 5.7 Error Management 5.8 Remarks on Reactive Networks.- References.<br>6 Proactive networks<br>6.1 From Reactive to Responsive 6.2 Keep the Network Ready 6.3 How do I Find My Multipoint Relay? 6.4 Life of an OLSR Node 6.5 The Node’s Information Repository 6.6 Shortest Path over the MPR Sub-topology 6.7 A Complete Example 6.8 How Proactive Can You Be? 6.9 The Power of Hybrid Protocols.- References.<br>7 Content-aware Networks<br>7.1 Routers Should Read the Content 7.2 A Network on Top of the Physical Network 7.3 Centralized Assignment of Node Identifiers 7.4 Centralized Entry-point Discovery 7.5 Multiple Bootstrap Servers 7.6 Decentralized Assignment of Node Identifiers 7.7 Entry Point Discovery via Underlying Links 7.8 Content is an Asset at the Edges.- References.<br>8 Distribution-efficient Networks<br>8.1 Publishing goes beyond Bootstrapping 8.2 The Two Flavors of Virtual Networking 8.3 Creating Unstructured Neighborhoods 8.4 Making Yourself Known in Unstructured Neighborhoods 8.5 Unstructured Resource Publishing 8.6 Secure a Role in Structure Worlds 8.7 Build Strict Formations 8.8 Place Links and Resources into a Structured Ring 8.9 Data-awareness via Protocol-agnosticism.- References.<br>9 Discovering Virtual Resources <br>9.1 Four Ways to Reach a Resource 9.2 Assessment of Discovery Mechanisms 9.3 Containing the Proliferation of Discovery Messages 9.4 Blind Discovery for Unstructured Networks 9.5 Informed Discovery in Unstructured Networks 9.6 Discovery in Loosely-Structured Networks 9.7 Deterministic Discovery in Structured Networks.- References.<br>10 A Peek at the Future Internet<br>10.1 The Fourth Networking Principle: Beyond Mere Connectivity 10.2 Internet of Things: Sense and Influence your Environment 10.3 Small, Large Networks 10.4 Manage the Autonomics 10.5 Dependable Networks 10.6 The Fine Line Between Freedom, Security and Privacy 10.7 Energy-efficient Networks 10.8 No Matter What, the Network will Remain Generative.- References.<br>Index</p>