An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Application-layer mobility using SIP
ACM SIGMOBILE Mobile Computing and Communications Review
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Adaptive Terminal Middleware for Session Mobility
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
An integrated mobility framework for pervasive communications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IEEE Communications Surveys & Tutorials
A survey and comparison of peer-to-peer overlay network schemes
IEEE Communications Surveys & Tutorials
At what layer does mobility belong?
IEEE Communications Magazine
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The rapid diffusion of wireless technologies for network access has fostered the expectation for enhanced forms of communication in the current and future Internet. To this aim, there is a large consent about pursuing user-centric and pervasive paradigms; that requires an integrated and uniform approach to mobility management, taking into account all the different aspects of this issue. However, current mobility protocols exhibit important limitations and drawbacks. Starting from these considerations, this paper sketches a mobility framework based on overlay infrastructures; we describe the main features it should exhibit and then we focus on the problem of keeping track of mobile node's location inside the network. We discuss the work done so far, which was addressed to compare and assess different DHT schemes for the above framework.