ILNP: mobility, multi-homing, localised addressing and security through naming
نویسندگان
چکیده
Internet users seek solutions for mobility, multihoming, support for localised address management (i.e. via NATs), and end-to-end security. Existing mobility approaches are not well integrated into the rest of the Internet architecture, instead primarily being separate extensions that at present are not widely deployed. Because the current approaches to these issues were developed separately, such approaches often are not harmonious when used together. Meanwhile, the Internet has a number of namespaces, for example the IP address or the Domain Name. In recent years, some have postulated that the Internet’s namespaces are not sufficiently rich and that the current concept of an address is too limiting. One proposal, the concept of separating an address into an Identifier and a separate Locator, has been controversial in the Internet community for years. It has been considered within the IETF and IRTF several times, but always was rejected as unworkable. This paper takes the position that evolving the naming in the Internet by splitting the address into separate Identifier and Locator names can provide an elegant integrated solution to the key issues listed above, without changing the core routing arR. Atkinson Extreme Networks, RTP, NC, USA e-mail: [email protected] S. Bhatti ( ) School of Computer Science, University of St Andrews, St Andrews, UK e-mail: [email protected] S. Hailes Department of Computer Science, University College London (UCL), London, UK e-mail: [email protected] chitecture, while offering incremental deployability through backwards compatibility with IPv6.
منابع مشابه
An Introduction to the Identifier-Locator Network Protocol (ILNP)
Mobility, multi-homing, local addressing and end-to-end security at the network layer remain challenging even with the advent of IPv6. We propose a new network protocol, which can be built upon IPv6 incrementally, that breaks the address into two separate entities, a Locator and an Identifier, with crisp semantics for each, that seeks to solve these issues through an improved naming and address...
متن کاملA Proposal for Enhancing Internet Naming
Solutions for mobility, multi-homing, support for localised address management (i.e. via NATs), and end-to-end security are functions that Internet users find increasingly desirable. Their respective solutions have not been developed in concert and their combined use may not be harmonious. Meanwhile, the Internet has a number of different namespaces, for example the IP address or the Domain Nam...
متن کاملDagstuhl Seminar on Naming and Addressing for Next Generation Internetworks
The design of naming and addressing for data networks is a fundamental architectural consideration, and several current or anticipated problems in the Internet – including mobility dynamics, forwarding table growth in the core routers, and security – point out possible limitations with naming and addressing schemes in use today. A seminar on the topic of naming and addressing for next generatio...
متن کاملBeyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet
The Internet is continuously evolving from a static, host-based, uniquely attached node model to a mobile, host-free node model with the possibility of multiple attachment points to the network. However, the current Internet was not designed to support this type of workload because of its strict addressing mechanism. Thus, the Future Internet promotes the introduction of new architectures that ...
متن کاملWeak Context Establishment Procedure for Mobility and Multi-Homing Management
Trust establishment seems to be the most difficult problem in mobility and multi-homing management. Many protocol proposals assume the presence of some security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context estab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Telecommunication Systems
دوره 42 شماره
صفحات -
تاریخ انتشار 2009