scispace - formally typeset
Search or ask a question
Topic

Internet appliance

About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.


Papers
More filters
Patent
18 Jun 1997
TL;DR: In this paper, an Internet access device (100) uses an automatic configuration process (600) to handle the task of configuring the Internet access devices at a customer site for communication with the Internet (10).
Abstract: An Internet access device (100) uses an automatic configuration process (600) to handle the task of configuring the Internet access device at a customer site for communication with the Internet (10). Once configured, the customer has electronic mail and other access to the Internet from his local area network. A not yet configured Internet access device is shipped directly to a customer without having to be manually configured first. The customer enters a registration identification number (326) and a telephone number onto the Internet access device. The Internet access device then automatically connects to the Internet, downloads configuration data from a configuration server (410) containing customer site specific configuration data, and then automatically configures itself for communication with the Internet. The Internet access device is simple to install for a customer and provides valuable features such as a router (240), firewall, e-mail gateway (212), web server (220), and other servers (222). The Internet access device initially connects to the Internet through an Internet service provider (14) over a standard analog telephone line using a standard modem (52) and using a dynamic IP address. Once automatically configured, the Internet access device may then communicate with the Internet using any suitable connection including an analog telephone line, or a higher-speed line such as an ISDN line or a frame relay circuit and is assigned a static IP address and a range of IP addresses for other devices on its local area network.

712 citations

Book
21 Dec 2009
TL;DR: 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems, and Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful.
Abstract: "It is stunningly thorough and takes readers meticulously through the design, conguration and operation of IPv6-based, low-power, potentially mobile radio-based networking" Vint Cerf, Vice President and Chief Internet Evangelist, Google This book provides a complete overview of IPv6 over Low Power Wireless Area Network (6LoWPAN) technology In this book, the authors provide an overview of the 6LoWPAN family of standards, architecture, and related wireless and Internet technology Starting with an overview of the IPv6 Internet of Things, readers are offered an insight into how these technologies fit together into a complete architecture The 6LoWPAN format and related standards are then covered in detail In addition, the authors discuss the building and operation of 6LoWPAN networks, including bootstrapping, routing, security, Internet ingration, mobility and application protocols Furthermore, implementation aspects of 6LoWPAN are covered Key Features: Demonstrates how the 6LoWPAN standard makes the latest Internet protocols available to even the most minimal embedded devices over low-rate wireless networks Provides an overview of the 6LoWPAN standard, architecture and related wireless and Internet technology, and explains the 6LoWPAN protocol format in detail Details operational topics such as bootstrapping, routing, security, Internet integration, mobility and application protocols Written by expert authors with vast experience in the field (industrial and academic) Includes an accompanying website containing tutorial slides, course material and open-source code with examples (http://6lowpannet ) 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful

689 citations

Book ChapterDOI
01 Jan 2010
TL;DR: RFID and other important technological developments such as IP stacks and web servers for smart everyday objects are considered and social and governance issues that are likely to arise as the vision of the Internet of Things becomes a reality are discussed.
Abstract: This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, we consider RFID and other important technological developments such as IP stacks and web servers for smart everyday objects. The paper concludes with a discussion of social and governance issues that are likely to arise as the vision of the Internet of Things becomes a reality.

652 citations

Patent
02 Nov 2007
TL;DR: A system and method that uses internet content and/or content metadata as a means to establish social networks is presented in this paper, which links internet users, searchers, viewers and listeners of the same and similar internet content to each other via a platform that enables any of the following in n-dimensional environments: social networking, communications, sharing, e-commerce, advertising, search, hosting and registry services, push and pull applications, anonymous communications, and rich presence.
Abstract: A system and method that uses internet content and/or content metadata as a means to establish social networks. Examples include linking internet users, searchers, viewers and/or listeners of the same and/or similar internet content to each other via a platform that enables any of the following in n-dimensional environments: social networking, communications, sharing, e-commerce, advertising, search, hosting and registry services, push and pull applications, anonymous communications, and rich presence.

646 citations

Book
11 Sep 1995
TL;DR: Building Internet Firewalls is a practical guide to building firewalls on the Internet and describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site.
Abstract: From the Publisher: More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from RD all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendices consisting of a resource summary, a directory of how to find firewall toolkits and other security-related tools, and a detailed summary providing TCP/IP background information.

568 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
77% related
Information system
107.5K papers, 1.8M citations
76% related
Web page
50.3K papers, 975.1K citations
74% related
Mobile computing
51.3K papers, 1M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202215
20211
20202
201814
201770