Download Personal Networks: Wireless Networking for Personal Devices (Wiley Series on Communications Networking & Distributed Systems) PDF

TitlePersonal Networks: Wireless Networking for Personal Devices (Wiley Series on Communications Networking & Distributed Systems)
File Size2.1 MB
Total Pages230
Table of Contents
                            Personal Networks
	Contents
	Foreword
	Preface
	List of Abbreviations
	1 The Vision of Personal Networks
		1.1 Past, Present, and Future Telecommunication
		1.2 Personal Networks
		1.3 Some Typical PN Use-Case Scenarios
			1.3.1 Introducing Jane
			1.3.2 The Traveling Saleswoman
			1.3.3 Care for the Elderly
			1.3.4 More Use-Case Scenarios
		1.4 Federations of Personal Networks
		1.5 Early Personal Network Implementations
		1.6 Expected Impact
		1.7 Summary
	2 Personal Networks User Requirements
		2.1 Ubiquitous Networking
		2.2 Heterogeneous Hardware Constraints
		2.3 Quality of Service and Reliability
		2.4 Name, Service, and Content Management
		2.5 Context Awareness
		2.6 Being Cognitive
		2.7 Security and Trust
		2.8 Privacy
		2.9 Usability
		2.10 Other Requirements
		2.11 Jane Revisited
		2.12 Summary
	3 Trends in Personal Networks
		3.1 Wireless Communications
		3.2 Ad Hoc Networking
		3.3 WWRF Book of Visions
		3.4 Ubiquitous and Pervasive Computing and Communication
		3.5 Ambient Networks
		3.6 IST PACWOMAN and SHAMAN
		3.7 Personal Distributed Environment
		3.8 MyNet
		3.9 P2P Universal Computing Consortium
		3.10 More Trends
		3.11 Personal Networks and Current Trends
		3.12 Summary
	4 The Personal Network Architecture
		4.1 Terminology
		4.2 Personal and Foreign Nodes
		4.3 The Three Level Architecture View
			4.3.1 Connectivity Abstraction Level
			4.3.2 Network Abstraction Level
			4.3.3 Application and Service Abstraction Level
			4.3.4 Interaction between the Levels
			4.3.5 Distribution of Networking Functionality in PNs
		4.4 Personalization of Nodes
		4.5 Cluster Organization
		4.6 Personal Network Organization
		4.7 Foreign Communication
		4.8 Higher Layer Support Systems
		4.9 Federations of Personal Networks
		4.10 Discussion
			4.10.1 Why a Network Layer Overlay?
			4.10.2 How Protected is a PN?
			4.10.3 How Usable is the PN Security?
			4.10.4 Do We Need to Manage Our PNs?
			4.10.5 What About the Social Dimension?
			4.10.6 More Issues?
		4.11 Summary
	5 Cluster Formation and Routing
		5.1 What is a Cluster?
		5.2 Mobile Ad Hoc Network Technologies
		5.3 Cluster Formation and Maintenance
			5.3.1 Multi-Hop Clusters
			5.3.2 Link Layer Device Discovery
			5.3.3 Discovery of Node Arrivals and Departures
			5.3.4 Merging and Splitting of Clusters
			5.3.5 Cluster Member List
		5.4 Intra-Cluster Routing
			5.4.1 Ad Hoc Routing Protocols
			5.4.2 Link Quality Assessment
			5.4.3 Unicast Routing
			5.4.4 Cluster-Wide Broadcasting
		5.5 Summary
	6 Inter-Cluster Tunneling and Routing
		6.1 Inter-Cluster Tunneling Requirements
		6.2 IP Mobility
			6.2.1 IETF Network Layer-Based Proposals
			6.2.2 Other Network Layer-Based Proposals
			6.2.3 Application Layer-Based Mobility Proposals
		6.3 PN Addressing
		6.4 Infrastructure Support
			6.4.1 PN Agent
			6.4.2 Edge Routers
			6.4.3 PN Networking without Infrastructure Support
		6.5 Inter-Cluster Tunneling
			6.5.1 Mobility and Dynamic Tunneling
			6.5.2 Always-Up and On-Demand Tunneling
			6.5.3 Gateway Node Coordination
			6.5.4 NAT Traversal
			6.5.5 Tunneling and Signaling Security
			6.5.6 Current Tunneling Protocols
		6.6 Inter-Cluster Routing
			6.6.1 PN Agent-Based Routing
			6.6.2 Tunnel Quality Assessment
			6.6.3 PN-Wide Broadcasting
		6.7 Summary
	7 Foreign Communication
		7.1 Requirements for Foreign Communication
		7.2 Setting up Communication with Foreign Nodes
			7.2.1 Foreign Node Discovery
			7.2.2 Accepting Connections from Foreign Nodes
		7.3 Bridging Inside and Outside Protocols
			7.3.1 At the Network Abstraction Level
			7.3.2 At the Service Abstraction Level
			7.3.3 Network versus Service Abstraction Level Approach
		7.4 Mobility and Gateway Node Handover
			7.4.1 Always Using the PN Agent
			7.4.2 Using the Optimal Gateway Node
			7.4.3 Using Service Proxies
		7.5 Summary
	8 Personal Network Application Support Systems
		8.1 Required PN Application Support
			8.1.1 Naming
			8.1.2 Ubiquitous Access to Services
			8.1.3 Pooling of Resources
			8.1.4 Gathering and Exploiting Context
			8.1.5 Ability to Optimize and Make Tradeoffs
		8.2 Design of a PN Application Support System
			8.2.1 Abstraction for the Application Programmer
			8.2.2 Mechanisms for Supporting the Applications
			8.2.3 Naming
			8.2.4 Service Discovery and Management
			8.2.5 Content Discovery and Management
			8.2.6 Context Management
			8.2.7 Mapping of Resources
			8.2.8 User Agent, Authentication, and Access Control
			8.2.9 PN Federation Management
			8.2.10 Static Management of PNs
		8.3 Service Discovery and Management Implementation
			8.3.1 Service Tiers
			8.3.2 Service Discovery Architecture
			8.3.3 Service Session Management
		8.4 An Implementation of Context Management
		8.5 Summary
	9 Personal Network Security
		9.1 Device Personalization
			9.1.1 Imprinting
			9.1.2 Imprinting Using Location Limited Channels
			9.1.3 Certi.ed PN Formation Protocol
			9.1.4 Eviction of Personal Nodes
		9.2 Establishment of Secure Communication
			9.2.1 Secure Unicast Communication
			9.2.2 PN Awareness at the Connectivity Level
			9.2.3 Secure Broadcast Communication
			9.2.4 Secure Inter-Cluster Communication
		9.3 Secure Foreign Communication
		9.4 Anonymity
			9.4.1 Anonymity in PNs
			9.4.2 Anonymity in Foreign Communication
		9.5 Summary
	10 Personal Network Federations
		10.1 Examples
		10.2 Types of Federations
		10.3 Requirements
		10.4 Architecture of a Federation
		10.5 Life Cycle of a Federation
			10.5.1 Initialization
			10.5.2 Discovery
			10.5.3 Participation
			10.5.4 Operation
			10.5.5 Dissolution
		10.6 Federation Access Control
			10.6.1 First-Level Access Control
			10.6.2 Second-Level Access Control
		10.7 Federation Implementation Approaches
			10.7.1 Network Overlay
			10.7.2 Service Proxy
		10.8 Security
			10.8.1 Trust between the Creator and a New Member
			10.8.2 Security Association between the Creator and a New Member
			10.8.3 Security Association among Federation Members
		10.9 Summary
	11 Personal Network Prototypes
		11.1 The TU Delft Prototype
			11.1.1 Hardware Platform
			11.1.2 Software Platform
			11.1.3 Intra-Cluster Implementation
			11.1.4 Sending and Receiving Intra-Cluster Traffic
			11.1.5 Interface Output Queue
			11.1.6 Intra-Cluster Flooding
			11.1.7 Intra-Cluster Routing
			11.1.8 PN Organization
			11.1.9 Lessons Learned
		11.2 The PNP2008 Prototypes
			11.2.1 Early PNP2008 Prototypes
			11.2.2 Final PNP2008 Prototypes
		11.3 The MAGNET Prototype
			11.3.1 Hardware and Software Platform
			11.3.2 PN Networking
			11.3.3 Security
			11.3.4 Service Discovery
			11.3.5 Context Management
			11.3.6 PN Federations
			11.3.7 Applications
		11.4 Summary
	12 The Future of Personal Networks
		12.1 Are We There Yet?
		12.2 Future Directions
	Appendix A Terminology
		A.1 Connectivity Abstraction Level
		A.2 Network Abstraction Level
		A.3 Application and Service Abstraction Level
		A.4 Personal Network Federations
	References
	Related Websites
	Index
                        

Similer Documents