Measured capacity of an Ethernet: myths and reality
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
Development of the Domain Name System
ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue. Highlights from 25 years of the Computer Communication Review
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Efficient and flexible location management techniques for wireless communication systems
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
A comparison of mechanisms for improving TCP performance over wireless links
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
M-TCP: TCP for mobile cellular networks
ACM SIGCOMM Computer Communication Review
Scalable support for transparent mobile host internetworking
Wireless Networks
IEEE Std 802.3b, C, D, and E - 1989: Supplements to Carrier Sense Multiple Access with Collision Detection (Csma-CD) Access Method and Physical Layer Specifications
A location management technique to support lifelong numbering in personal communications services
ACM SIGMOBILE Mobile Computing and Communications Review
I-TCP: indirect TCP for mobile hosts
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
IEEE Communications Magazine
Hi-index | 0.00 |
In this paper, we propose a novel approach to computer mobility. Our approach allows mobility to be rapidly deployed, as the networking infrastructure required for deployment is available off the shelf. Furthermore, a mobile node does not require modifications in order to use these mobile services. While our approach provides rapid deployment and supports both IP and non-IP protocols, only a subset of mobile usage scenarios are offered. In other words, our approach does not solve all the problems of mobility. We discuss the characteristics of mobility usage, and we list the scenarios our approach supports. We believe that the mobile usage scenarios supported by this method are some of the more common usage scenarios. We also believe that investigations into this method will provide more insights into network and mobility research.