Networking in personal networks

Mikko Alutoin, Kimmo Ahola, Wassef Louati, Wajdi Louati, Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Djamal Zeghlache

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review


    This paper addresses networking in terms of tunnels and overlays establishment, naming, addressing and routing for Personal Networks (PN). A number of concepts to achieve PN networking and management are presented. A PN Agent is introduced in the PN architecture. The Agent supplies information about clusters constituting the PN to enable networking within the PN. The paper also explores the use of edge routers in the overall framework to support PN networking via virtual private network paradigms and PN services. The virtual router concept, well established for layer 3 VPN solutions in networks, is advocated to resolve scalability and latency requirements in PN networking. A hybrid solution involving both end users and provider provisioned VPNs to establish personal network overlays is suggested to find a compromise between performance and security requirements. Proactive and reactive routing along with flat and subnet based addressing for PN are also covered by this contribution.
    Original languageEnglish
    Title of host publicationASWN 2005: Applications and Services in Wireless Networks
    Subtitle of host publicationWorkshop Proceedings
    EditorsHossam Afifi, Djamal Zeghlache
    PublisherIEEE Institute of Electrical and Electronic Engineers
    ISBN (Print)2-9156-18-08-9
    Publication statusPublished - 2005
    MoE publication typeA4 Article in a conference publication
    Event5th Workshop on Applications and Services in Wireless Networks, ASWN 2005 - Paris, France
    Duration: 29 Jun 20051 Jul 2005


    Conference5th Workshop on Applications and Services in Wireless Networks, ASWN 2005


    • personal networks
    • virtual personal overlay networks
    • naming
    • addressing
    • routing


    Dive into the research topics of 'Networking in personal networks'. Together they form a unique fingerprint.

    Cite this