ebook img

Personal Networks: Wireless Networking for Personal Devices (Wiley Series on Communications Networking & Distributed Systems) PDF

231 Pages·2010·2.23 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Personal Networks: Wireless Networking for Personal Devices (Wiley Series on Communications Networking & Distributed Systems)

PERSONAL NETWORKS WILEY SERIES IN COMMUNICATIONS NETWORKING & DISTRIBUTED SYSTEMS Series Editors: David Hutchison, Lancaster University, Lancaster, UK Serge Fdida, Universite´ Pierre et Marie Curie, Paris, France Joe Sventek, University of Glasgow, Glasgow, UK The ‘Wiley Series in Communications Networking & Distributed Systems’ is a series of expert-level, technically detailed books covering cutting-edge research, and brand new developments as well as tutorial-style treatments in networking, middleware and software technologies for communications and distributed systems. The books will provide timely and reliable information about the state-of-the-art to researchers, advanced students and development engineers in the Telecommunications and the Computing sectors. Other titles in the series: Wright: Voice over Packet Networks 0-471-49516-6 (February 2001) Jepsen: Java for Telecommunications 0-471-49826-2 (July 2001) Sutton: Secure Communications 0-471-49904-8 (December 2001) Stajano: Security for Ubiquitous Computing 0-470-84493-0 (February 2002) Martin-Flatin: Web-Based Management of IP Networks and Systems 0-471-48702-3 (September 2002) Berman, Fox, Hey: Grid Computing. Making the Global Infrastructure a Reality 0-470-85319-0 (March 2003) Turner, Magill, Marples: Service Provision. Technologies for Next Generation Communications 0-470-85066-3 (April 2004) Welzl: Network Congestion Control: Managing Internet Traffic 0-470-02528-X (July 2005) Raz, Juhola, Serrat-Fernandez, Galis: Fast and Efficient Context-Aware Services 0-470-01668-X (April 2006) Heckmann: The Competitive Internet Service Provider 0-470-01293-5 (April 2006) Dressler: Self-Organization in Sensor and Actor Networks 0-470-02820-3 (November 2007) Berndt: Towards 4G Technologies: Services with Initiative 0-470-01031-2 (March 2008) Jacquenet, Bourdon, Boucadair: Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments 0-470-01829-1 (March 2008) Minei/Lucek: MPLS-Enabled Applications: Emerging Developments and New Technologies, Second Edition 0-470-98644-1 (April 2008) Gurtov: Host Identity Protocol (HIP): Towards the Secure Mobile Internet 0-470-99790-7 (June 2008) Boucadair: Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-enabled Networks 0-470-77072-4 (January 2009) Fitzek: Mobile Peer to Peer (P2P): A Tutorial Guide 0-470-69992-2 (June 2009) Shelby: 6LoWPAN: The Wireless Embedded Internet 0-470-74799-4 (November 2009) Stavdas: Core and Metro Networks 0-470-51274-1 (February 2010)  Go´mez Herrero, Bernal van der Ven, Network Mergers and Migrations: Junos Design and Implementation 0-470-74237-2 (March 2010) PERSONAL NETWORKS WIRELESS NETWORKING FOR PERSONAL DEVICES Martin Jacobsson Delft University of Technology, The Netherlands Ignas Niemegeers Delft University of Technology, The Netherlands Sonia Heemstra de Groot Delft University of Technology, The Netherlands and Twente Institute of Wireless and Mobile Communications, The Netherlands A John Wiley and Sons, Ltd., Publication This edition first published 2010  2010 John Wiley & Sons Ltd. Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Jacobsson, Martin, 1976- Personal networks : wireless networking for personal devices / Martin Jacobsson, Ignas Niemegeers, Sonia Heemstra de Groot. p. cm. Includes bibliographical references and index. ISBN 978-0-470-68173-2 (cloth) 1. Wireless communication systems. 2. Personal communication service systems. 3. Ubiquitous computing. I. Niemegeers, Ignas. II. Heemstra de Groot, Sonia. III. Title. TK5103.2J34 2010 621.384 – dc22 2010005593 A catalogue record for this book is available from the British Library. ISBN 978-0-470-68173-2 (H/B) Set in 10/12 Times by Laserwords Private Limited, Chennai, India Printed and Bound in Singapore by Markono Print Media Pte Ltd. Contents Foreword xi Preface xiii List of Abbreviations xvii 1 The Vision of Personal Networks 1 1.1 Past, Present, and Future Telecommunication 1 1.2 Personal Networks 4 1.3 Some Typical PN Use-Case Scenarios 6 1.3.1 Introducing Jane 6 1.3.2 The Traveling Saleswoman 7 1.3.3 Care for the Elderly 8 1.3.4 More Use-Case Scenarios 10 1.4 Federations of Personal Networks 11 1.5 Early Personal Network Implementations 11 1.6 Expected Impact 11 1.7 Summary 13 2 Personal Networks User Requirements 15 2.1 Ubiquitous Networking 15 2.2 Heterogeneous Hardware Constraints 16 2.3 Quality of Service and Reliability 17 2.4 Name, Service, and Content Management 17 2.5 Context Awareness 18 2.6 Being Cognitive 18 2.7 Security and Trust 19 2.8 Privacy 19 2.9 Usability 20 2.10 Other Requirements 21 2.11 Jane Revisited 21 2.12 Summary 22 3 Trends in Personal Networks 23 3.1 Wireless Communications 23 vi Contents 3.2 Ad Hoc Networking 25 3.3 WWRF Book of Visions 26 3.4 Ubiquitous and Pervasive Computing and Communication 28 3.5 Ambient Networks 29 3.6 IST PACWOMAN and SHAMAN 29 3.7 Personal Distributed Environment 30 3.8 MyNet 32 3.9 P2P Universal Computing Consortium 32 3.10 More Trends 33 3.11 Personal Networks and Current Trends 34 3.12 Summary 35 4 The Personal Network Architecture 37 4.1 Terminology 38 4.2 Personal and Foreign Nodes 38 4.3 The Three Level Architecture View 38 4.3.1 Connectivity Abstraction Level 39 4.3.2 Network Abstraction Level 40 4.3.3 Application and Service Abstraction Level 43 4.3.4 Interaction between the Levels 44 4.3.5 Distribution of Networking Functionality in PNs 44 4.4 Personalization of Nodes 45 4.5 Cluster Organization 46 4.6 Personal Network Organization 48 4.7 Foreign Communication 49 4.8 Higher Layer Support Systems 50 4.9 Federations of Personal Networks 51 4.10 Discussion 52 4.10.1 Why a Network Layer Overlay? 52 4.10.2 How Protected is a PN? 53 4.10.3 How Usable is the PN Security? 54 4.10.4 Do We Need to Manage Our PNs? 54 4.10.5 What About the Social Dimension? 55 4.10.6 More Issues? 56 4.11 Summary 56 5 Cluster Formation and Routing 59 5.1 What is a Cluster? 59 5.2 Mobile Ad Hoc Network Technologies 62 5.3 Cluster Formation and Maintenance 64 5.3.1 Multi-Hop Clusters 64 5.3.2 Link Layer Device Discovery 65 5.3.3 Discovery of Node Arrivals and Departures 66 5.3.4 Merging and Splitting of Clusters 67 5.3.5 Cluster Member List 67 Contents vii 5.4 Intra-Cluster Routing 68 5.4.1 Ad Hoc Routing Protocols 68 5.4.2 Link Quality Assessment 69 5.4.3 Unicast Routing 72 5.4.4 Cluster-Wide Broadcasting 73 5.5 Summary 74 6 Inter-Cluster Tunneling and Routing 75 6.1 Inter-Cluster Tunneling Requirements 77 6.2 IP Mobility 78 6.2.1 IETF Network Layer-Based Proposals 78 6.2.2 Other Network Layer-Based Proposals 80 6.2.3 Application Layer-Based Mobility Proposals 80 6.3 PN Addressing 81 6.4 Infrastructure Support 81 6.4.1 PN Agent 82 6.4.2 Edge Routers 83 6.4.3 PN Networking without Infrastructure Support 85 6.5 Inter-Cluster Tunneling 86 6.5.1 Mobility and Dynamic Tunneling 86 6.5.2 Always-Up and On-Demand Tunneling 88 6.5.3 Gateway Node Coordination 89 6.5.4 NAT Traversal 90 6.5.5 Tunneling and Signaling Security 91 6.5.6 Current Tunneling Protocols 91 6.6 Inter-Cluster Routing 91 6.6.1 PN Agent-Based Routing 92 6.6.2 Tunnel Quality Assessment 93 6.6.3 PN-Wide Broadcasting 94 6.7 Summary 95 7 Foreign Communication 97 7.1 Requirements for Foreign Communication 98 7.2 Setting up Communication with Foreign Nodes 99 7.2.1 Foreign Node Discovery 100 7.2.2 Accepting Connections from Foreign Nodes 101 7.3 Bridging Inside and Outside Protocols 101 7.3.1 At the Network Abstraction Level 102 7.3.2 At the Service Abstraction Level 103 7.3.3 Network versus Service Abstraction Level Approach 105 7.4 Mobility and Gateway Node Handover 106 7.4.1 Always Using the PN Agent 106 7.4.2 Using the Optimal Gateway Node 107 7.4.3 Using Service Proxies 109 7.5 Summary 110 viii Contents 8 Personal Network Application Support Systems 111 8.1 Required PN Application Support 111 8.1.1 Naming 113 8.1.2 Ubiquitous Access to Services 113 8.1.3 Pooling of Resources 114 8.1.4 Gathering and Exploiting Context 114 8.1.5 Ability to Optimize and Make Tradeoffs 115 8.2 Design of a PN Application Support System 116 8.2.1 Abstraction for the Application Programmer 116 8.2.2 Mechanisms for Supporting the Applications 117 8.2.3 Naming 118 8.2.4 Service Discovery and Management 118 8.2.5 Content Discovery and Management 119 8.2.6 Context Management 120 8.2.7 Mapping of Resources 120 8.2.8 User Agent, Authentication, and Access Control 122 8.2.9 PN Federation Management 122 8.2.10 Static Management of PNs 122 8.3 Service Discovery and Management Implementation 123 8.3.1 Service Tiers 123 8.3.2 Service Discovery Architecture 125 8.3.3 Service Session Management 127 8.4 An Implementation of Context Management 127 8.5 Summary 128 9 Personal Network Security 129 9.1 Device Personalization 129 9.1.1 Imprinting 130 9.1.2 Imprinting Using Location Limited Channels 131 9.1.3 Certified PN Formation Protocol 132 9.1.4 Eviction of Personal Nodes 133 9.2 Establishment of Secure Communication 134 9.2.1 Secure Unicast Communication 134 9.2.2 PN Awareness at the Connectivity Level 135 9.2.3 Secure Broadcast Communication 136 9.2.4 Secure Inter-Cluster Communication 137 9.3 Secure Foreign Communication 137 9.4 Anonymity 138 9.4.1 Anonymity in PNs 138 9.4.2 Anonymity in Foreign Communication 139 9.5 Summary 140 10 Personal Network Federations 141 10.1 Examples 142 10.2 Types of Federations 146 10.3 Requirements 147

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.