Guidelines for interdomain traffic engineering
ACM SIGCOMM Computer Communication Review
Can ISPS and P2P users cooperate for improved performance?
ACM SIGCOMM Computer Communication Review
Performance of host identity protocol on lightweight hardware
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
On the use of SHIM6 for mobility support in IMS networks
Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities
Six/one router: a scalable and backwards compatible solution for provider-independent addressing
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Performance Analysis of the REAchability Protocol for IPv6 Multihoming
NEW2AN '07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
The resource pooling principle
ACM SIGCOMM Computer Communication Review
Preparing network configurations for IPv6 renumbering
International Journal of Network Management
IP address authorization for secure address proxying using multi-key CGAs and ring signatures
IWSEC'06 Proceedings of the 1st international conference on Security
The paths toward IPv6 multihoming
IEEE Communications Surveys & Tutorials
IPv6 multihoming support in the mobile internet
IEEE Wireless Communications
Interdomain traffic engineering with BGP
IEEE Communications Magazine
Hi-index | 0.24 |
In the changing landscape of the todays Internet, several solutions are under investigation to allow efficient, flexible and scalable multihoming. One of the proposals is shim6, a host-based multihoming solution based on the use of multiple IPv6 addresses on each host. In this work, we first describe the main features of this protocol, then we explain our implementation of shim6, along with the associated security mechanisms in the Linux kernel and, finally, we evaluate its performance. In particular, we analyse the performance impact of the security mechanisms used by shim6 and the impact of shim6 on the performance of end-host systems, especially heavily loaded servers. We conclude by discussing the remaining open issues for a widespread deployment of host-based multihoming techniques such as shim6.