91,99 €
Written by experts in the field, this book describes the Personal Network architecture and its various components This book focuses on networking and security aspects of Personal Networks (PNs). Given a single user, the authors propose an architecture for PNs in which devices are divided into one of two types of nodes: personal nodes and foreign nodes. Furthermore, the authors demonstrate the ways in which PNs can be formed in a self-organized and secure way, how they can be interconnected using infrastructure networks, how multiple PNs can be connected, and how their services and resources can be shared. In addition, the book shows how security and ease-of-use can be achieved through automatic configuration and how mobility can be supported through adaptability and self-organization. The motivations for the PN concept, the PN architecture, its functionalities and features, as well as future challenges are covered in depth. Finally, the authors consider the potential applications for PNs and briefly discuss additional support systems for PN applications. The latter includes service discovery and context information management among others. Key Features: * Describes the PN network architecture and its various components in-depth * Written by experts who developed this concept * Discusses the newer topic of federations of PNs * Considers potential PN applications, and demonstrates how applications support systems, such as service discovery and context management, can assist the applications * Provides an insight into the challenges of future personal networking, architectures for PNs, potential and important solutions, and their implications This book will serve as an invaluable reference for researchers, developers, and standardization experts in mobile and wireless communication systems and services. It will also be of interest to postgraduate students in the field of telecommunications.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 440
Veröffentlichungsjahr: 2011
Contents
Foreword
Preface
List of Abbreviations
1 The Vision of Personal Networks
1.1 Past, Present, and Future Telecommunication
1.2 Personal Networks
1.3 Some Typical PN Use-Case Scenarios
1.4 Federations of Personal Networks
1.5 Early Personal Network Implementations
1.6 Expected Impact
1.7 Summary
2 Personal Networks User Requirements
2.1 Ubiquitous Networking
2.2 Heterogeneous Hardware Constraints
2.3 Quality of Service and Reliability
2.4 Name, Service, and Content Management
2.5 Context Awareness
2.6 Being Cognitive
2.7 Security and Trust
2.8 Privacy
2.9 Usability
2.10 Other Requirements
2.11 Jane Revisited
2.12 Summary
3 Trends in Personal Networks
3.1 Wireless Communications
3.2 Ad Hoc Networking
3.3 WWRF Book of Visions
3.4 Ubiquitous and Pervasive Computing and Communication
3.5 Ambient Networks
3.6 IST PACWOMAN and SHAMAN
3.7 Personal Distributed Environment
3.8 My Net
3.9 P2P Universal Computing Consortium
3.10 More Trends
3.11 Personal Networks and Current Trends
3.12 Summary
4 The Personal Network Architecture
4.1 Terminology
4.2 Personal and Foreign Nodes
4.3 The Three Level Architecture View
4.4 Personalization of Nodes
4.5 Cluster Organization
4.6 Personal Network Organization
4.7 Foreign Communication
4.8 Higher Layer Support Systems
4.9 Federations of Personal Networks
4.10 Discussion
4.11 Summary
5 Cluster Formation and Routing
5.1 What is a Cluster?
5.2 Mobile Ad Hoc Network Technologies
5.3 Cluster Formation and Maintenance
5.4 Intra-Cluster Routing
5.5 Summary
6 Inter-Cluster Tunneling and Routing
6.1 Inter-Cluster Tunneling Requirements
6.2 IP Mobility
6.3 PN Addressing
6.4 Infrastructure Support
6.5 Inter-Cluster Tunneling
6.6 Inter-Cluster Routing
6.7 Summary
7 Foreign Communication
7.1 Requirements for Foreign Communication
7.2 Setting up Communication with Foreign Nodes
7.3 Bridging Inside and Outside Protocols
7.4 Mobility and Gateway Node Handover
7.5 Summary
8 Personal Network Application Support Systems
8.1 Required PN Application Support
8.2 Design of a PN Application Support System
8.3 Service Discovery and Management Implementation
8.4 An Implementation of Context Management
8.5 Summary
9 Personal Network Security
9.1 Device Personalization
9.2 Establishment of Secure Communication
9.3 Secure Foreign Communication
9.4 Anonymity
9.5 Summary
10 Personal Network Federations
10.1 Examples
10.2 Types of Federations
10.3 Requirements
10.4 Architecture of a Federation
10.5 Life Cycle of a Federation
10.6 Federation Access Control
10.7 Federation Implementation Approaches
10.8 Security
10.9 Summary
11 Personal Network Prototypes
11.1 The TU Delft Prototype
11.2 The PNP2008 Prototypes
11.3 The MAGNET Prototype
11.4 Summary
12 The Future of Personal Networks
12.1 Are We There Yet?
12.2 Future Directions
Appendix A Terminology
A.1 Connectivity Abstraction Level
A.2 Network Abstraction Level
A.3 Application and Service Abstraction Level
A.4 Personal Network Federations
References
Related Websites
Index
WILEY SERIES IN COMMUNICATIONS NETWORKING & DISTRIBUTED SYSTEMS
Series Editors:David Hutchison, Lancaster University, Lancaster, UKSerge Fdida, Université Pierre et Marie Curie, Paris, FranceJoe Sventek, University of Glasgow, Glasgow, UKThe ‘Wiley Series in Communications Networking & Distributed Systems’ is a series of expert-level, technically detailed books covering cutting-edge research, and brand new developments as well as tutorial-style treatments in networking, middleware and software technologies for communications and distributed systems. The books will provide timely and reliable information about the state-of-the-art to researchers, advanced students and development engineers in the Telecommunications and the Computing sectors.
Other titles in the series:
Wright: Voice over Packet Networks 0-471-49516-6 (February 2001)
Jepsen: Java for Telecommunications 0-471-49826-2 (July 2001)
Sutton: Secure Communications 0-471-49904-8 (December 2001)
Stajano: Security for Ubiquitous Computing 0-470-84493-0 (February 2002)
Martin-Flatin: Web-Based Management of IP Networks and Systems 0-471-48702-3 (September 2002)
Berman, Fox, Hey: Grid Computing. Making the Global Infrastructure a Reality 0-470-85319-0 (March 2003)
Turner, Magill, Marples: Service Provision. Technologies for Next Generation Communications 0-470-85066-3 (April 2004)
Welzl: Network Congestion Control: Managing Internet Traffic 0-470-02528-X (July 2005)
Raz, Juhola, Serrat-Fernandez, Galis: Fast and Efficient Context-Aware Services 0-470-01668-X (April 2006)
Heckmann: The Competitive Internet Service Provider 0-470-01293-5 (April 2006)
Dressler: Self-Organization in Sensor and Actor Networks 0-470-02820-3 (November 2007)
Berndt: Towards 4G Technologies: Services with Initiative 0-470-01031-2 (March 2008)
Jacquenet, Bourdon, Boucadair: Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments 0-470-01829-1 (March 2008)
Minei/Lucek: MPLS-Enabled Applications: Emerging Developments and New Technologies, Second Edition 0-470-98644-1 (April 2008)
Gurtov: Host Identity Protocol (HIP): Towards the Secure Mobile Internet 0-470-99790-7 (June 2008)
Boucadair: Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-enabled Networks 0-470-77072-4 (January 2009)
Fitzek: Mobile Peer to Peer (P2P): A Tutorial Guide 0-470-69992-2 (June 2009)
Shelby: 6LoWPAN: The Wireless Embedded Internet 0-470-74799-4 (November 2009)
Stavdas: Core and Metro Networks 0-470-51274-1 (February 2010)
Gómez Herrero, Bernal van der Ven, Network Mergers and Migrations: Junos® Design and Implementation 0-470-74237-2 (March 2010)
This edition first published 2010
© 2010 John Wiley & Sons Ltd.
Registered officeJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
Jacobsson, Martin, 1976-Personal networks: wireless networking for personal devices/Martin Jacobsson, Ignas Niemegeers,Sonia Heemstra de Groot.p. cm.Includes bibliographical references and index.ISBN 978-0-470-68173-2 (cloth)1. Wireless communication systems. 2. Personal communication service systems. 3. Ubiquitouscomputing. I. Niemegeers, Ignas. II. Heemstra de Groot, Sonia. III. Title.TK5103.2J34 2010621.384 – dc222010005593
A catalogue record for this book is available from the British Library.
ISBN 978-0-470-68173-2 (H/B)
Foreword
The personal network (PN) vision is essentially that people’s access to digital assets (all the devices that they own and their contents) should be made simple and convenient at any time and from any location. As with any vision, this is easily enough stated yet extremely difficult to realize fully. There is certainly much more to it, in terms of technical challenges and potential benefits, than the vision would seem to imply.
Some readers may not see much distinction between the PN ambition and what is readily available today in a smart phone. Others may understand that the PN is beyond current capabilities but may not see why anyone would want to adopt it. Yet others may find the notion of PNs desirable but believe that it is really unattainable.
This book anticipates the questions raised by each of the above viewpoints. It presents visions in the form of future scenarios, and the associated future user requirements in more technical terms. The current know-how in personal networking and where it is going next are also covered. These early chapters should provide the uninformed or skeptical reader with the necessary incentive to read further. They also convey the tremendously exciting possibilities offered by PNs across various walks of life.
The bulk of the book is about how PNs might be realized, starting with a description of the architecture in which the necessary technical elements would be combined. Each of the main technical issues is covered in detail in separate chapters that show how the user’s access to digital assets can be achieved – MANET clusters, routing and tunneling between clusters, communication with so-called ‘foreign devices’, applications support and security implications. Three prototype personal network systems are outlined, including the authors’ own at the Delft University of Technology. Finally, there is a brief look ahead exploring what PNs may be like in the future.
This welcome new volume in the Wiley Series in Communications Networking & Distributed Systems is written by three of the leading experts who have been immersed for the past several years in the challenge of building personal networks. It gives a comprehensive and distinctive coverage of this important field and should appeal broadly to researchers and practitioners in the field of communications and computer networks as well as to those specifically enthused by the prospect of personal networking.
David HutchisonLancaster University
Preface
Recent decades have shown a tremendous expansion of the Internet. The number of connected terminals has increased by orders of magnitude, traffic has grown exponentially, coverage has become ubiquitous and worldwide, and today’s sophisticated Web 2.0 applications are increasingly providing services which hitherto have been the realm of telecommunications, such as Skype and video conferencing. This has even led to the thought that access to the Internet might one day be a universal right of every citizen. This evolution will accelerate in the coming decades. The driving factor is mobile Internet, a result of the continuing validity of Moore’s law, according to which the density of microelectronic circuitry doubles every year and a half. The implication is that computing power and, in its wake, communication power will continue to increase exponentially. Its corollary is a fall in the cost of providing a certain amount of computing and communication power to the extent that it is becoming perfectly feasible to equip every artifact with computing and communication capabilities. This is what enables ‘the Internet of things’ – it is expected that there will be of the order of 1000 devices per person in the year 2017 (Tafazolli 2004). The range of device types and their capabilities will be mind-boggling. Most of these devices will be mobile or at least wirelessly connected. A huge challenge will be to exploit this sea of devices and their connectedness to create novel and useful applications without drowning in the complexity of managing large heterogeneous distributed systems.
The vision of personal networks was based on these trends, which were foreseeable given Moore’s law and the derived technology roadmaps. It was the result of brainstorming sessions taking place in 2000 at Ericsson Research and Delft University of Technology in the Netherlands. The dream was to create an environment in which every person has at his fingertips all the digital devices he owns regardless of where he or she is and where those devices are, as long as they are connected. We envisaged a person to be always surrounded by a ‘virtual digital bubble’ formed by his or her personal devices. This personal network would enhance a person’s private and professional capabilities in terms of access to information, control of his environment, social interaction, etc. It would dynamically change as the person moved around and engaged in different activities. It would have a global reach and would always incorporate those devices that are most suitable to support the person.
As we began exploring the idea, we came upon the Moped project of Robin Kravetz at the University of Illinois, which had a similar vision. This together with other ideas triggered the concept of a personal network, the subject of this book. The ideas were elaborated in two large European research projects, MAGNET and MAGNET Beyond, and two Dutch projects, PNP2008 and QoS for PN@Home. These led not only to the development and prototypes of technical solutions for the basic functionalities required in personal networks, but also to first experiments with applications and the study of potential business models. The concrete solutions that are presented in this book were developed in those projects. In parallel, similar ideas had been developed in the UK in the context of the Mobile Virtual Centre of Excellence by James Irvine and John Dunlop at the University of Strathclyde. Their concept was named the ‘personal distributed environment’.
The ideas about personal networks were very much centered on the person and how her capabilities could be enhanced by creating a synergetic environment consisting of the hundreds of personal digital devices she might own in the near future. A natural next step was to explore how similar synergies could be achieved by pooling personal resources to support and enhance the activities of a group of people. This led to the concept of federations of personal networks belonging to different people. These ideas were also explored in the MAGNET Beyond and PNP2008 projects.
The basic foundations have been laid to build personal networks and their federations, and prototypes and demonstrators have been built. More research is needed in particular to create environments that allow rapid development of personal network applications, and to facilitate different business roles and models to make the concepts commercially viable. This will also require efforts in standardization, which have already started.
The market pull to build and use personal networks and their federations is not there yet. However, we believe that we are on the brink of a breakthrough in this respect. If the WWRF predictions of 1000 devices per person in 2017 and the 100 billion mobile Internet devices in the next decade foreseen by Cisco (Cisco Systems 2009) become a reality, concepts such as personal networks will be good tools not only to manage the resulting complexity, but, even more importantly, to create hitherto unknown opportunities to empower people in their private lives and at work.
This book covers the core concepts of personal networks and federations of personal networks, and explains their architecture. It elaborates in detail the various aspects of these architectures, including topics such as networking, self-configuration, security, personal services, service sharing, and context management. It also discusses the outcomes of several personal network research projects, including the prototypes. It is aimed at researchers, developers, and standardization experts in mobile and wireless communication systems and services. It should also be of interest to graduate students in the field of telecommunications and distributed systems.
The book is organized as follows. The introductory Chapter 1 describes the vision underlying personal networks. This is followed by Chapter 2 that set the stage by discussing user requirements and Chapter 3 that covers trends in personal networking. Readers who are up to date on the state of the art of developments in wireless and mobile technologies and applications and ubiquitous computing may go straight to Chapter 4 that discusses the personal network architecture. Next are several detailed chapters that may be read independently: Chapter 5 on cluster formation and routing, Chapter 6 on inter-cluster tunneling, Chapter 7 on communication between a personal network and entities that do not belong to it (the so-called foreign devices), Chapter 8 on application support, Chapter 9 on security, and Chapter 10 on federations of personal networks. Chapter 11 introduces three different existing personal network prototypes that builds on the concepts introduced in the previous chapters. The book is rounded off by Chapter 12, which gives the authors’ view on the future of personal networks.
Acknowledgments
We have already acknowledged the projects that led to the elaboration of the personal networks and their federations, but we should in particular acknowledge the hard work of many PhD and MSc students at Delft University of Technology and other universities across Europe who contributed research results and building blocks. We should also mention leading research institutes, such as the University of Cantabria, IBBT, Télécom & Management Paris Sud, TNO, VTT, LETI, and CSEM and companies, such as TIWMC, NEC, Nokia, Telia Sonera, Philips, and KPN that played a big role in the projects we mentioned. Furthermore, we gratefully acknowledge the work of our colleagues at TI-WMC and Delft University of Technology involved in the research and development of personal networks.
We must mention three persons who believe in our ideas and have given us strong support: John de Waal of Ericsson Research and co-founder of TI-WMC, through interactions with whom the concept of personal networks took shape; Dr. Jorge Pereira of the European Commission who saw the potential and challenged and encouraged us; and Prof. Ramjee Prasad of Aalborg University who carried the heavy load of managing the MAGNET and MAGNET Beyond projects.
We are also grateful to Jereon Hoebeke (IBBT) and Kimmo Ahola (VTT) for providing us with screen shots of the MAGNET prototype. Last but not least, we would also like to thank the people, including Sabih Gerez and Torsten Jacobsson, who read earlier versions of this book and provided valuable feedback.
Martin Jacobsson, Ignas Niemegeers, Sonia Heemstra de GrootDelft, The Netherlands
List of Abbreviations
3GPPThird Generation Partnership ProjectAAAAuthentication, Authorization, and AccountingADSLAsymmetric Digital Subscriber LineAIPNAll-IP NetworksANAmbient NetworksAODVAd Hoc On-Demand Distance VectorAPIApplication Programming InterfaceBANBody Area NetworkCACertification AuthorityCANCommunity Area NetworkCBBCounter-Based BroadcastingCMIContext Management InterfaceCMNContext Management NodeCoACare-of AddressCPFPCertified PN Formation ProtocolCRLCertificate Revocation ListCSCertificate ServerCTSClear to SendDADirectory AgentDADDuplicate Address DetectionDBDatabaseDCFDistributed Coordination FunctionDHCPDynamic Host Configuration ProtocolDHTDistributed Hash TableDMEDevice Management EntityDNADetecting Network AccessDNSDomain Name SystemDoSDenial-of-ServiceDSDVDestination-Sequenced Distance-Vector RoutingDSLDigital Subscriber LineDSRDynamic Source RoutingDYMODynamic MANET On-Demand Routing ProtocolECCElliptic Curve CryptographyEREdge RouterESPEncapsulating Security PayloadETTExpected Transmission TimeETXExpected Transmission CountEWMAExponentially Weighted Moving AverageFAForeign AgentFIFOFirst In First OutFMIPv6Fast Handover for Mobile IPv6Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
