PDA

View Full Version : PERSONAL NETWORKS - WIRELESS NETWORKING FOR PERSONAL DEVICES



ccwu2009
2011-07-22, 01:02 PM
1 The Vision of Personal Networks 1
1.1 Past, Present, and Future Telecommunication 1
1.2 Personal Networks 4
1.3 Some Typical PN Use-Case Scenarios 6
1.3.1 Introducing Jane 6
1.3.2 The Traveling Saleswoman 7
1.3.3 Care for the Elderly 8
1.3.4 More Use-Case Scenarios 10
1.4 Federations of Personal Networks 11
1.5 Early Personal Network Implementations 11
1.6 Expected Impact 11
1.7 Summary 13
2 Personal Networks User Requirements 15
2.1 Ubiquitous Networking 15
2.2 Heterogeneous Hardware Constraints 16
2.3 Quality of Service and Reliability 17
2.4 Name, Service, and Content Management 17
2.5 Context Awareness 18
2.6 Being Cognitive 18
2.7 Security and Trust 19
2.8 Privacy 19
2.9 Usability 20
2.10 Other Requirements 21
2.11 Jane Revisited 21
2.12 Summary 22
3 Trends in Personal Networks 23
3.1 Wireless Communications 23vi Contents
3.2 Ad Hoc Networking 25
3.3 WWRF Book of Visions 26
3.4 Ubiquitous and Pervasive Computing and Communication 28
3.5 Ambient Networks 29
3.6 IST PACWOMAN and SHAMAN 29
3.7 Personal Distributed Environment 30
3.8 MyNet 32
3.9 P2P Universal Computing Consortium 32
3.10 More Trends 33
3.11 Personal Networks and Current Trends 34
3.12 Summary 35
4 The Personal Network Architecture 37
4.1 Terminology 38
4.2 Personal and Foreign Nodes 38
4.3 The Three Level Architecture View 38
4.3.1 Connectivity Abstraction Level 39
4.3.2 Network Abstraction Level 40
4.3.3 Application and Service Abstraction Level 43
4.3.4 Interaction between the Levels 44
4.3.5 Distribution of Networking Functionality in PNs 44
4.4 Personalization of Nodes 45
4.5 Cluster Organization 46
4.6 Personal Network Organization 48
4.7 Foreign Communication 49
4.8 Higher Layer Support Systems 50
4.9 Federations of Personal Networks 51
4.10 Discussion 52
4.10.1 Why a Network Layer Overlay? 52
4.10.2 How Protected is a PN? 53
4.10.3 How Usable is the PN Security? 54
4.10.4 Do We Need to Manage Our PNs? 54
4.10.5 What About the Social Dimension? 55
4.10.6 More Issues? 56
4.11 Summary 56
5 Cluster Formation and Routing 59
5.1 What is a Cluster? 59
5.2 Mobile Ad Hoc Network Technologies 62
5.3 Cluster Formation and Maintenance 64
5.3.1 Multi-Hop Clusters 64
5.3.2 Link Layer Device Discovery 65
5.3.3 Discovery of Node Arrivals and Departures 66
5.3.4 Merging and Splitting of Clusters 67
5.3.5 Cluster Member List 67Contents vii
5.4 Intra-Cluster Routing 68
5.4.1 Ad Hoc Routing Protocols 68
5.4.2 Link Quality Assessment 69
5.4.3 Unicast Routing 72
5.4.4 Cluster-Wide Broadcasting 73
5.5 Summary 74
6 Inter-Cluster Tunneling and Routing 75
6.1 Inter-Cluster Tunneling Requirements 77
6.2 IP Mobility 78
6.2.1 IETF Network Layer-Based Proposals 78
6.2.2 Other Network Layer-Based Proposals 80
6.2.3 Application Layer-Based Mobility Proposals 80
6.3 PN Addressing 81
6.4 Infrastructure Support 81
6.4.1 PN Agent 82
6.4.2 Edge Routers 83
6.4.3 PN Networking without Infrastructure Support 85
6.5 Inter-Cluster Tunneling 86
6.5.1 Mobility and Dynamic Tunneling 86
6.5.2 Always-Up and On-Demand Tunneling 88
6.5.3 Gateway Node Coordination 89
6.5.4 NAT Traversal 90
6.5.5 Tunneling and Signaling Security 91
6.5.6 Current Tunneling Protocols 91
6.6 Inter-Cluster Routing 91
6.6.1 PN Agent-Based Routing 92
6.6.2 Tunnel Quality Assessment 93
6.6.3 PN-Wide Broadcasting 94
6.7 Summary 95
7 Foreign Communication 97
7.1 Requirements for Foreign Communication 98
7.2 Setting up Communication with Foreign Nodes 99
7.2.1 Foreign Node Discovery 100
7.2.2 Accepting Connections from Foreign Nodes 101
7.3 Bridging Inside and Outside Protocols 101
7.3.1 At the Network Abstraction Level 102
7.3.2 At the Service Abstraction Level 103
7.3.3 Network versus Service Abstraction Level Approach 105
7.4 Mobility and Gateway Node Handover 106
7.4.1 Always Using the PN Agent 106
7.4.2 Using the Optimal Gateway Node 107
7.4.3 Using Service Proxies 109
7.5 Summary 110viii Contents
8 Personal Network Application Support Systems 111
8.1 Required PN Application Support 111
8.1.1 Naming 113
8.1.2 Ubiquitous Access to Services 113
8.1.3 Pooling of Resources 114
8.1.4 Gathering and Exploiting Context 114
8.1.5 Ability to Optimize and Make Tradeoffs 115
8.2 Design of a PN Application Support System 116
8.2.1 Abstraction for the Application Programmer 116
8.2.2 Mechanisms for Supporting the Applications 117
8.2.3 Naming 118
8.2.4 Service Discovery and Management 118
8.2.5 Content Discovery and Management 119
8.2.6 Context Management 120
8.2.7 Mapping of Resources 120
8.2.8 User Agent, Authentication, and Access Control 122
8.2.9 PN Federation Management 122
8.2.10 Static Management of PNs 122
8.3 Service Discovery and Management Implementation 123
8.3.1 Service Tiers 123
8.3.2 Service Discovery Architecture 125
8.3.3 Service Session Management 127
8.4 An Implementation of Context Management 127
8.5 Summary 128
9 Personal Network Security 129
9.1 Device Personalization 129
9.1.1 Imprinting 130
9.1.2 Imprinting Using Location Limited Channels 131
9.1.3 Certified PN Formation Protocol 132
9.1.4 Eviction of Personal Nodes 133
9.2 Establishment of Secure Communication 134
9.2.1 Secure Unicast Communication 134
9.2.2 PN Awareness at the Connectivity Level 135
9.2.3 Secure Broadcast Communication 136
9.2.4 Secure Inter-Cluster Communication 137
9.3 Secure Foreign Communication 137
9.4 Anonymity 138
9.4.1 Anonymity in PNs 138
9.4.2 Anonymity in Foreign Communication 139
9.5 Summary 140
10 Personal Network Federations 141
10.1 Examples 142
10.2 Types of Federations 146
10.3 Requirements 147Contents ix
10.4 Architecture of a Federation 148
10.5 Life Cycle of a Federation 150
10.5.1 Initialization 150
10.5.2 Discovery 151
10.5.3 Participation 151
10.5.4 Operation 151
10.5.5 Dissolution 152
10.6 Federation Access Control 152
10.6.1 First-Level Access Control 152
10.6.2 Second-Level Access Control 152
10.7 Federation Implementation Approaches 154
10.7.1 Network Overlay 154
10.7.2 Service Proxy 155
10.8 Security 156
10.8.1 Trust between the Creator and a New Member 156
10.8.2 Security Association between the Creator and a New Member 157
10.8.3 Security Association among Federation Members 158
10.9 Summary 158
11 Personal Network Prototypes 159
11.1 The TU Delft Prototype 160
11.1.1 Hardware Platform 160
11.1.2 Software Platform 160
11.1.3 Intra-Cluster Implementation 161
11.1.4 Sending and Receiving Intra-Cluster Traffic 163
11.1.5 Interface Output Queue 165
11.1.6 Intra-Cluster Flooding 165
11.1.7 Intra-Cluster Routing 166
11.1.8 PN Organization 166
11.1.9 Lessons Learned 170
11.2 The PNP2008 Prototypes 171
11.2.1 Early PNP2008 Prototypes 171
11.2.2 Final PNP2008 Prototypes 173
11.3 The MAGNET Prototype 175
11.3.1 Hardware and Software Platform 176
11.3.2 PN Networking 177
11.3.3 Security 178
11.3.4 Service Discovery 178
11.3.5 Context Management 179
11.3.6 PN Federations 180
11.3.7 Applications 180
11.4 Summary 181
12 The Future of Personal Networks 183
12.1 Are We There Yet? 183
12.2 Future Directions 184x Contents
Appendix A Terminology 187
A.1 Connectivity Abstraction Level 187
A.2 Network Abstraction Level 187
A.3 Application and Service Abstraction Level 188
A.4 Personal Network Federations 189