Development of the domain name system
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
DNS and BIND
DNS performance and the effectiveness of caching
IEEE/ACM Transactions on Networking (TON)
A proposal for unifying mobility with multi-homing, NAT, & security
Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Mobility through naming: impact on dns
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Measuring and Improving the Performance of Network Mobility Management in IPv6 Networks
IEEE Journal on Selected Areas in Communications
Evolving the internet architecture through naming
IEEE Journal on Selected Areas in Communications - Special issue title on scaling the internet routing system: an interim report
Secure mobility management based on session key agreements
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Network layer soft handoff for IP mobility
Proceedings of the 8th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Hi-index | 0.00 |
Mobile Networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.