Table of Contents
Personal Networks
Contents
Foreword
Preface
List of Abbreviations
1 The Vision of Personal Networks
1.1 Past, Present, and Future Telecommunication
1.2 Personal Networks
1.3 Some Typical PN Use-Case Scenarios
1.3.1 Introducing Jane
1.3.2 The Traveling Saleswoman
1.3.3 Care for the Elderly
1.3.4 More Use-Case Scenarios
1.4 Federations of Personal Networks
1.5 Early Personal Network Implementations
1.6 Expected Impact
1.7 Summary
2 Personal Networks User Requirements
2.1 Ubiquitous Networking
2.2 Heterogeneous Hardware Constraints
2.3 Quality of Service and Reliability
2.4 Name, Service, and Content Management
2.5 Context Awareness
2.6 Being Cognitive
2.7 Security and Trust
2.8 Privacy
2.9 Usability
2.10 Other Requirements
2.11 Jane Revisited
2.12 Summary
3 Trends in Personal Networks
3.1 Wireless Communications
3.2 Ad Hoc Networking
3.3 WWRF Book of Visions
3.4 Ubiquitous and Pervasive Computing and Communication
3.5 Ambient Networks
3.6 IST PACWOMAN and SHAMAN
3.7 Personal Distributed Environment
3.8 MyNet
3.9 P2P Universal Computing Consortium
3.10 More Trends
3.11 Personal Networks and Current Trends
3.12 Summary
4 The Personal Network Architecture
4.1 Terminology
4.2 Personal and Foreign Nodes
4.3 The Three Level Architecture View
4.3.1 Connectivity Abstraction Level
4.3.2 Network Abstraction Level
4.3.3 Application and Service Abstraction Level
4.3.4 Interaction between the Levels
4.3.5 Distribution of Networking Functionality in PNs
4.4 Personalization of Nodes
4.5 Cluster Organization
4.6 Personal Network Organization
4.7 Foreign Communication
4.8 Higher Layer Support Systems
4.9 Federations of Personal Networks
4.10 Discussion
4.10.1 Why a Network Layer Overlay?
4.10.2 How Protected is a PN?
4.10.3 How Usable is the PN Security?
4.10.4 Do We Need to Manage Our PNs?
4.10.5 What About the Social Dimension?
4.10.6 More Issues?
4.11 Summary
5 Cluster Formation and Routing
5.1 What is a Cluster?
5.2 Mobile Ad Hoc Network Technologies
5.3 Cluster Formation and Maintenance
5.3.1 Multi-Hop Clusters
5.3.2 Link Layer Device Discovery
5.3.3 Discovery of Node Arrivals and Departures
5.3.4 Merging and Splitting of Clusters
5.3.5 Cluster Member List
5.4 Intra-Cluster Routing
5.4.1 Ad Hoc Routing Protocols
5.4.2 Link Quality Assessment
5.4.3 Unicast Routing
5.4.4 Cluster-Wide Broadcasting
5.5 Summary
6 Inter-Cluster Tunneling and Routing
6.1 Inter-Cluster Tunneling Requirements
6.2 IP Mobility
6.2.1 IETF Network Layer-Based Proposals
6.2.2 Other Network Layer-Based Proposals
6.2.3 Application Layer-Based Mobility Proposals
6.3 PN Addressing
6.4 Infrastructure Support
6.4.1 PN Agent
6.4.2 Edge Routers
6.4.3 PN Networking without Infrastructure Support
6.5 Inter-Cluster Tunneling
6.5.1 Mobility and Dynamic Tunneling
6.5.2 Always-Up and On-Demand Tunneling
6.5.3 Gateway Node Coordination
6.5.4 NAT Traversal
6.5.5 Tunneling and Signaling Security
6.5.6 Current Tunneling Protocols
6.6 Inter-Cluster Routing
6.6.1 PN Agent-Based Routing
6.6.2 Tunnel Quality Assessment
6.6.3 PN-Wide Broadcasting
6.7 Summary
7 Foreign Communication
7.1 Requirements for Foreign Communication
7.2 Setting up Communication with Foreign Nodes
7.2.1 Foreign Node Discovery
7.2.2 Accepting Connections from Foreign Nodes
7.3 Bridging Inside and Outside Protocols
7.3.1 At the Network Abstraction Level
7.3.2 At the Service Abstraction Level
7.3.3 Network versus Service Abstraction Level Approach
7.4 Mobility and Gateway Node Handover
7.4.1 Always Using the PN Agent
7.4.2 Using the Optimal Gateway Node
7.4.3 Using Service Proxies
7.5 Summary
8 Personal Network Application Support Systems
8.1 Required PN Application Support
8.1.1 Naming
8.1.2 Ubiquitous Access to Services
8.1.3 Pooling of Resources
8.1.4 Gathering and Exploiting Context
8.1.5 Ability to Optimize and Make Tradeoffs
8.2 Design of a PN Application Support System
8.2.1 Abstraction for the Application Programmer
8.2.2 Mechanisms for Supporting the Applications
8.2.3 Naming
8.2.4 Service Discovery and Management
8.2.5 Content Discovery and Management
8.2.6 Context Management
8.2.7 Mapping of Resources
8.2.8 User Agent, Authentication, and Access Control
8.2.9 PN Federation Management
8.2.10 Static Management of PNs
8.3 Service Discovery and Management Implementation
8.3.1 Service Tiers
8.3.2 Service Discovery Architecture
8.3.3 Service Session Management
8.4 An Implementation of Context Management
8.5 Summary
9 Personal Network Security
9.1 Device Personalization
9.1.1 Imprinting
9.1.2 Imprinting Using Location Limited Channels
9.1.3 Certi.ed PN Formation Protocol
9.1.4 Eviction of Personal Nodes
9.2 Establishment of Secure Communication
9.2.1 Secure Unicast Communication
9.2.2 PN Awareness at the Connectivity Level
9.2.3 Secure Broadcast Communication
9.2.4 Secure Inter-Cluster Communication
9.3 Secure Foreign Communication
9.4 Anonymity
9.4.1 Anonymity in PNs
9.4.2 Anonymity in Foreign Communication
9.5 Summary
10 Personal Network Federations
10.1 Examples
10.2 Types of Federations
10.3 Requirements
10.4 Architecture of a Federation
10.5 Life Cycle of a Federation
10.5.1 Initialization
10.5.2 Discovery
10.5.3 Participation
10.5.4 Operation
10.5.5 Dissolution
10.6 Federation Access Control
10.6.1 First-Level Access Control
10.6.2 Second-Level Access Control
10.7 Federation Implementation Approaches
10.7.1 Network Overlay
10.7.2 Service Proxy
10.8 Security
10.8.1 Trust between the Creator and a New Member
10.8.2 Security Association between the Creator and a New Member
10.8.3 Security Association among Federation Members
10.9 Summary
11 Personal Network Prototypes
11.1 The TU Delft Prototype
11.1.1 Hardware Platform
11.1.2 Software Platform
11.1.3 Intra-Cluster Implementation
11.1.4 Sending and Receiving Intra-Cluster Traffic
11.1.5 Interface Output Queue
11.1.6 Intra-Cluster Flooding
11.1.7 Intra-Cluster Routing
11.1.8 PN Organization
11.1.9 Lessons Learned
11.2 The PNP2008 Prototypes
11.2.1 Early PNP2008 Prototypes
11.2.2 Final PNP2008 Prototypes
11.3 The MAGNET Prototype
11.3.1 Hardware and Software Platform
11.3.2 PN Networking
11.3.3 Security
11.3.4 Service Discovery
11.3.5 Context Management
11.3.6 PN Federations
11.3.7 Applications
11.4 Summary
12 The Future of Personal Networks
12.1 Are We There Yet?
12.2 Future Directions
Appendix A Terminology
A.1 Connectivity Abstraction Level
A.2 Network Abstraction Level
A.3 Application and Service Abstraction Level
A.4 Personal Network Federations
References
Related Websites
Index