Personal Networks : Wireless Networking for Personal Devices. için kapak resmi
Personal Networks : Wireless Networking for Personal Devices.
Başlık:
Personal Networks : Wireless Networking for Personal Devices.
Yazar:
Jacobsson, Martin.
ISBN:
9780470666708
Yazar Ek Girişi:
Basım Bilgisi:
1st ed.
Fiziksel Tanımlama:
1 online resource (230 pages)
Seri:
Wiley Series on Communications Networking & Distributed Systems ; v.35

Wiley Series on Communications Networking & Distributed Systems
İçerik:
Personal Networks -- Contents -- Foreword -- Preface -- List of Abbreviations -- 1 The Vision of Personal Networks -- 1.1 Past, Present, and Future Telecommunication -- 1.2 Personal Networks -- 1.3 Some Typical PN Use-Case Scenarios -- 1.3.1 Introducing Jane -- 1.3.2 The Traveling Saleswoman -- 1.3.3 Care for the Elderly -- 1.3.4 More Use-Case Scenarios -- 1.4 Federations of Personal Networks -- 1.5 Early Personal Network Implementations -- 1.6 Expected Impact -- 1.7 Summary -- 2 Personal Networks User Requirements -- 2.1 Ubiquitous Networking -- 2.2 Heterogeneous Hardware Constraints -- 2.3 Quality of Service and Reliability -- 2.4 Name, Service, and Content Management -- 2.5 Context Awareness -- 2.6 Being Cognitive -- 2.7 Security and Trust -- 2.8 Privacy -- 2.9 Usability -- 2.10 Other Requirements -- 2.11 Jane Revisited -- 2.12 Summary -- 3 Trends in Personal Networks -- 3.1 Wireless Communications -- 3.2 Ad Hoc Networking -- 3.3 WWRF Book of Visions -- 3.4 Ubiquitous and Pervasive Computing and Communication -- 3.5 Ambient Networks -- 3.6 IST PACWOMAN and SHAMAN -- 3.7 Personal Distributed Environment -- 3.8 MyNet -- 3.9 P2P Universal Computing Consortium -- 3.10 More Trends -- 3.11 Personal Networks and Current Trends -- 3.12 Summary -- 4 The Personal Network Architecture -- 4.1 Terminology -- 4.2 Personal and Foreign Nodes -- 4.3 The Three Level Architecture View -- 4.3.1 Connectivity Abstraction Level -- 4.3.2 Network Abstraction Level -- 4.3.3 Application and Service Abstraction Level -- 4.3.4 Interaction between the Levels -- 4.3.5 Distribution of Networking Functionality in PNs -- 4.4 Personalization of Nodes -- 4.5 Cluster Organization -- 4.6 Personal Network Organization -- 4.7 Foreign Communication -- 4.8 Higher Layer Support Systems -- 4.9 Federations of Personal Networks -- 4.10 Discussion -- 4.10.1 Why a Network Layer Overlay?.

4.10.2 How Protected is a PN? -- 4.10.3 How Usable is the PN Security? -- 4.10.4 Do We Need to Manage Our PNs? -- 4.10.5 What About the Social Dimension? -- 4.10.6 More Issues? -- 4.11 Summary -- 5 Cluster Formation and Routing -- 5.1 What is a Cluster? -- 5.2 Mobile Ad Hoc Network Technologies -- 5.3 Cluster Formation and Maintenance -- 5.3.1 Multi-Hop Clusters -- 5.3.2 Link Layer Device Discovery -- 5.3.3 Discovery of Node Arrivals and Departures -- 5.3.4 Merging and Splitting of Clusters -- 5.3.5 Cluster Member List -- 5.4 Intra-Cluster Routing -- 5.4.1 Ad Hoc Routing Protocols -- 5.4.2 Link Quality Assessment -- 5.4.3 Unicast Routing -- 5.4.4 Cluster-Wide Broadcasting -- 5.5 Summary -- 6 Inter-Cluster Tunneling and Routing -- 6.1 Inter-Cluster Tunneling Requirements -- 6.2 IP Mobility -- 6.2.1 IETF Network Layer-Based Proposals -- 6.2.2 Other Network Layer-Based Proposals -- 6.2.3 Application Layer-Based Mobility Proposals -- 6.3 PN Addressing -- 6.4 Infrastructure Support -- 6.4.1 PN Agent -- 6.4.2 Edge Routers -- 6.4.3 PN Networking without Infrastructure Support -- 6.5 Inter-Cluster Tunneling -- 6.5.1 Mobility and Dynamic Tunneling -- 6.5.2 Always-Up and On-Demand Tunneling -- 6.5.3 Gateway Node Coordination -- 6.5.4 NAT Traversal -- 6.5.5 Tunneling and Signaling Security -- 6.5.6 Current Tunneling Protocols -- 6.6 Inter-Cluster Routing -- 6.6.1 PN Agent-Based Routing -- 6.6.2 Tunnel Quality Assessment -- 6.6.3 PN-Wide Broadcasting -- 6.7 Summary -- 7 Foreign Communication -- 7.1 Requirements for Foreign Communication -- 7.2 Setting up Communication with Foreign Nodes -- 7.2.1 Foreign Node Discovery -- 7.2.2 Accepting Connections from Foreign Nodes -- 7.3 Bridging Inside and Outside Protocols -- 7.3.1 At the Network Abstraction Level -- 7.3.2 At the Service Abstraction Level -- 7.3.3 Network versus Service Abstraction Level Approach.

7.4 Mobility and Gateway Node Handover -- 7.4.1 Always Using the PN Agent -- 7.4.2 Using the Optimal Gateway Node -- 7.4.3 Using Service Proxies -- 7.5 Summary -- 8 Personal Network Application Support Systems -- 8.1 Required PN Application Support -- 8.1.1 Naming -- 8.1.2 Ubiquitous Access to Services -- 8.1.3 Pooling of Resources -- 8.1.4 Gathering and Exploiting Context -- 8.1.5 Ability to Optimize and Make Tradeoffs -- 8.2 Design of a PN Application Support System -- 8.2.1 Abstraction for the Application Programmer -- 8.2.2 Mechanisms for Supporting the Applications -- 8.2.3 Naming -- 8.2.4 Service Discovery and Management -- 8.2.5 Content Discovery and Management -- 8.2.6 Context Management -- 8.2.7 Mapping of Resources -- 8.2.8 User Agent, Authentication, and Access Control -- 8.2.9 PN Federation Management -- 8.2.10 Static Management of PNs -- 8.3 Service Discovery and Management Implementation -- 8.3.1 Service Tiers -- 8.3.2 Service Discovery Architecture -- 8.3.3 Service Session Management -- 8.4 An Implementation of Context Management -- 8.5 Summary -- 9 Personal Network Security -- 9.1 Device Personalization -- 9.1.1 Imprinting -- 9.1.2 Imprinting Using Location Limited Channels -- 9.1.3 Certi.ed PN Formation Protocol -- 9.1.4 Eviction of Personal Nodes -- 9.2 Establishment of Secure Communication -- 9.2.1 Secure Unicast Communication -- 9.2.2 PN Awareness at the Connectivity Level -- 9.2.3 Secure Broadcast Communication -- 9.2.4 Secure Inter-Cluster Communication -- 9.3 Secure Foreign Communication -- 9.4 Anonymity -- 9.4.1 Anonymity in PNs -- 9.4.2 Anonymity in Foreign Communication -- 9.5 Summary -- 10 Personal Network Federations -- 10.1 Examples -- 10.2 Types of Federations -- 10.3 Requirements -- 10.4 Architecture of a Federation -- 10.5 Life Cycle of a Federation -- 10.5.1 Initialization -- 10.5.2 Discovery -- 10.5.3 Participation.

10.5.4 Operation -- 10.5.5 Dissolution -- 10.6 Federation Access Control -- 10.6.1 First-Level Access Control -- 10.6.2 Second-Level Access Control -- 10.7 Federation Implementation Approaches -- 10.7.1 Network Overlay -- 10.7.2 Service Proxy -- 10.8 Security -- 10.8.1 Trust between the Creator and a New Member -- 10.8.2 Security Association between the Creator and a New Member -- 10.8.3 Security Association among Federation Members -- 10.9 Summary -- 11 Personal Network Prototypes -- 11.1 The TU Delft Prototype -- 11.1.1 Hardware Platform -- 11.1.2 Software Platform -- 11.1.3 Intra-Cluster Implementation -- 11.1.4 Sending and Receiving Intra-Cluster Traffic -- 11.1.5 Interface Output Queue -- 11.1.6 Intra-Cluster Flooding -- 11.1.7 Intra-Cluster Routing -- 11.1.8 PN Organization -- 11.1.9 Lessons Learned -- 11.2 The PNP2008 Prototypes -- 11.2.1 Early PNP2008 Prototypes -- 11.2.2 Final PNP2008 Prototypes -- 11.3 The MAGNET Prototype -- 11.3.1 Hardware and Software Platform -- 11.3.2 PN Networking -- 11.3.3 Security -- 11.3.4 Service Discovery -- 11.3.5 Context Management -- 11.3.6 PN Federations -- 11.3.7 Applications -- 11.4 Summary -- 12 The Future of Personal Networks -- 12.1 Are We There Yet? -- 12.2 Future Directions -- Appendix A Terminology -- A.1 Connectivity Abstraction Level -- A.2 Network Abstraction Level -- A.3 Application and Service Abstraction Level -- A.4 Personal Network Federations -- References -- Related Websites -- Index.
Özet:
Written by experts in the field, this book describes the Personal Network architecture and its various components This book focuses on networking and security aspects of Personal Networks (PNs). Given a single user, the authors propose an architecture for PNs in which devices are divided into one of two types of nodes: personal nodes and foreign nodes. Furthermore, the authors demonstrate the ways in which PNs can be formed in a self-organized and secure way, how they can be interconnected using infrastructure networks, how multiple PNs can be connected, and how their services and resources can be shared. In addition, the book shows how security and ease-of-use can be achieved through automatic configuration and how mobility can be supported through adaptability and self-organization. The motivations for the PN concept, the PN architecture, its functionalities and features, as well as future challenges are covered in depth. Finally, the authors consider the potential applications for PNs and briefly discuss additional support systems for PN applications. The latter includes service discovery and context information management among others. Key Features: Describes the PN network architecture and its various components in-depth Written by experts who developed this concept Discusses the newer topic of federations of PNs Considers potential PN applications, and demonstrates how applications support systems, such as service discovery and context management, can assist the applications Provides an insight into the challenges of future personal networking, architectures for PNs, potential and important solutions, and their implications This book will serve as an invaluable reference for researchers, developers, and standardization experts in mobile and wireless communication systems and services. It will also be of interest to postgraduate

students in the field of telecommunications.
Notlar:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Elektronik Erişim:
Click to View
Ayırtma: Copies: