How Fast do Identifier-to-locator Mappings Change in Networks with Identifier/Locator Separation?

نویسندگان

  • Hongbin Luo
  • Hongke Zhang
  • Chunming Qiao
چکیده

There is a growing consensus that identifier/locator separation is a promising solution to the scalability issue of the current routing infrastructure. After locators are separated from identifiers, end hosts roam from place to place without changing their identifiers. On the other hand, their locators change when they roam from one place to another, which leads to changes of identifier-to-locator mappings. In this paper, we analyze the possible change rates of identifier-to-locator mappings by analyzing the intervals of consecutive handovers, based on real data traces of collected from 2,348 buses, 536 taxis, and several tens of pedestrians. We believe that our results lay a solid foundation for the design and performance evaluation of mapping mechanisms that map identifiers onto locators in networks with identifier/locator separation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation

As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier separation, we systematically analyze the mitigation of worm propagation in three aspe...

متن کامل

A Local Approach to Fast Failure Recovery of LISP Ingress Tunnel Routers

LISP (Locator/ID Separation Protocol) has been proposed as a future Internet architecture in order to solve the scalability issues the current architecture is facing. LISP tunnels packets between border routers, which are the locators of the non-globally routable identifiers associated to end-hosts. In this context, the encapsulating routers, which are called Ingress Tunnel Routers (ITR) and le...

متن کامل

Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation

Recent research in the designing of an elegant mapping service to map identifiers onto locators in networks with locator/identifier separation, focuses on solving practical issues related to mapping system. However, how to provide entire secure support in separation networks is still an open issue. In this paper, we present the design and evaluation of a hierarchical indirect mapping system (HI...

متن کامل

Implementing the Locator/ID Separation Protocol: Design and experience

During the last few years, the network research community and the industry have been working on the design of an alternate Internet Routing Architecture aiming at solving the issues arising in the current architecture. It is widely accepted that applying a Locator/ID Separation paradigm would result in a more scalable and flexible architecture. As the name suggests, in Locator/ID Separation the...

متن کامل

Locator/ID Separation: Study on the cost of Mappings Caching and Mappings Lookups

Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related to interdomain routing. The approach that is being explored is based on the separation of the end-systems’ addressing space (the identifiers) and the routing locators’ space. This separation is meant to alleviate the r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010