Identifier Locator Separation

View this topic in
The separation of the IPv4 and IPv6 address space following a network-based map-and-encapsulate scheme. (Wikipedia.org)




IEEE Organizations related to Identifier Locator Separation

Back to Top


Conferences related to Identifier Locator Separation

Back to Top

2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN)

With the proliferation of future wireless technologies and electronic devices, there is a fast growing interest in ubiquitous and future networks. In the days to come, we expect that the ubiquitous communication and networking technologies will become ubiquitous along with the emergence of many future networking technologies. The ubiquitous and future network will offer multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed-mobile convergence, quality of service, variable connectivity, spontaneous networking, autonomic networking and other capabilities as the norm. Building on the success of the last ten years, the Eleventh International Conference on Ubiquitous and Future Networks(ICUFN 2019) aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)

    With the proliferation of future wireless technologies and electronic devices, there is a fast growing interest in ubiquitous and future networks. In the days to come, we expect that the ubiquitous communication and networking technologies will become ubiquitous along with the emergence of many future networking technologies. The ubiquitous and future network will offer multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed-mobile convergence, quality of service, variable connectivity, spontaneous networking, autonomic networking and other capabilities as the norm. Building on the success of the last nine years, the tenth International Conference on Ubiquitous and Future Networks (ICUFN 2018) aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)

    With the proliferation of future wireless technologies and electronic devices, there is a fast growing interest in ubiquitous and future networks. In the days to come, we expect that the ubiquitous communication and networking technologies will become ubiquitous along with the emergence of many future networking technologies. The ubiquitous and future network will offer multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed-mobile convergence, quality of service, variable connectivity, spontaneous networking, autonomic networking and other capabilities as the norm. Building on the success of the last eight years, the ninth International Conference on Ubiquitous and Future Networks (ICUFN 2017) aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)

    With the proliferation of future wireless technologies and electronic devices, there is a fast growing interest in ubiquitous and future networks. In the days to come, we expect that the ubiquitous communication and networking technologies will become ubiquitous along with the emergence of many future networking technologies. The ubiquitous and future network will offer multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed-mobile convergence, quality of service, variable connectivity, spontaneous networking, autonomic networking and other capabilities as the norm. Building on the success of the last seven years, the eighth International Conference on Ubiquitous and Future Networks (ICUFN 2016) aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN)

    With the proliferation of future wireless technologies and electronic devices, there is a fast growing interest in ubiquitous and future networks. In the days to come, we expect that the ubiquitous communication and networking technologies will become ubiquitous along with the emergence of many future networking technologies. The ubiquitous and future network will offer multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed-mobile convergence, quality of service, variable connectivity, spontaneous networking, autonomic networking and other capabilities as the norm. Building on the success of the last six years, the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015) aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN)

    THE UBIQUITOUS AND FUTURE NETWORKS WILL OFFER MULTISERVICE, MULTIMEDIA SERVICES CONVERGENCE, MOBILITY, SERVICE UBIQUITY AND CONTEXT AWARENESS, FI XED-MOBILE CONVERGENCE, QUALITY OF SERVICE, VARIABLE CONNECTIVITY, SPONTANEOUS NETWORKING, AUTONOMIC NETWORKING AND OTHER CAPABILITIES AS THE NORM. BUILDING ON THE SUCCESS OF THE FIRST, SECOND, THIRD, FOURTH, AND FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2009, ICUFN2010,ICUFN2011, ICUFN2012, ICUFN2013).THE SIXTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2014) AIMS AT ADDRESSING ADVANCES IN RESEARCH ON UBIQUITOUS AND FUTURE NETWORKS, COVERING TOPICS RANGING FROM TECHNOLOGY ISSUES TO APPLICATIONS AND TEST-BED DEVELOPMENTS.

  • 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN)

    THE UBIQUITOUS AND FUTURE NETWORKS WILL OFFER MULTISERVICE, MULTIMEDIA SERVICES CONVERGENCE, MOBILITY, SERVICE UBIQUITY AND CONTEXT AWARENESS, FI XED-MOBILE CONVERGENCE, QUALITY OF SERVICE, VARIABLE CONNECTIVITY, SPONTANEOUS NETWORKING, AUTONOMIC NETWORKING AND OTHER CAPABILITIES AS THE NORM. BUILDING ON THE SUCCESS OF THE FIRST, SECOND, THIRD, AND FOURTHINTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2009, ICUFN2010,ICUFN2011, ICUFN2012), THE FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2013) AIMS AT ADDRESSING ADVANCES IN RESEARCH ON UBIQUITOUS AND FUTURE NETWORKS, COVERING TOPICS RANGING FROM TECHNOLOGY ISSUES TO APPLICATIONS AND TEST-BED DEVELOPMENTS.

  • 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN)

    ICUFN 2012 aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to emerging applications and test-bed developments.

  • 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN)

    THE UBIQUITOUS AND FUTURE NETWORKS WILL OFFER MULTISERVICE, MULTIMEDIA SERVICES CONVERGENCE, MOBILITY, SERVICE UBIQUITY AND CONTEXT AWARENESS, FI XED-MOBILE CONVERGENCE, QUALITY OF SERVICE, VARIABLE CONNECTIVITY, SPONTANEOUS NETWORKING, AUTONOMIC NETWORKING AND OTHER CAPABILITIES AS THE NORM.

  • 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)

    ICUFN 2010 aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to applications and test-bed developments.

  • 2009 First International Conference on Ubiquitous and Future Networks (ICUFN)

    ICUFN aims at addressing advances in research on ubiquitous and future networks, covering topics ranging from technology issues to applications and test-bed developments to support multiservice, multimedia services convergence, mobility, service ubiquity and context awareness, fixed mobile convergence, QoS, variable connectivity, spontaneous networking, autonomic networking and etc.


More Conferences

Periodicals related to Identifier Locator Separation

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Network and Service Management, IEEE Transactions on

The online-only IEEE Transactions on Network and Service Management (TNSM) will be committed to the timely publication of archival-quality papers that advance the state-of-the-art and practical applications of network and service management. Both theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. This Transactions will focus on ...


Network, IEEE

IEEE Network was the number one most-cited journal in telecommunications, the number twelve most-cited journal in electrical and electronics engineering, and the number three most-cited journal in Computer Science Hardware and Architecture in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers topics which include: ...


More Periodicals

Most published Xplore authors for Identifier Locator Separation

Back to Top

Xplore Articles related to Identifier Locator Separation

Back to Top

Identifier/locator separation: A worm detection and prevention perspective

2011 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2011), 2011

Identifier/locator separation is widely recognized as a promising solution to the routing scalability issue of the Internet routing architecture. Although it is believed that networks with identifier/locator separation are more secure than networks without identifier/locator separation, identifier/locator separation cannot evade the damage of worms either. In this paper, we argue that identifier/locator separation can help detect and prevent worms by ...


A fast handover management scheme for mobile identifier/locator separation networks

2011 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2011), 2011

Several researches propose the identifier/locator separation architecture to address the scaling problems of today's Internet routing and addressing system. And scalable and seamless mobility support is an important task in mobile identifier/locator separation networks. In this paper, by analyzing the features, such as direct separation, flexible mapping and identifier replacement, we show that the new architecture delivers data packets more ...


A distributed mapping system to support mobility in identifier/locator separation architecture

2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009

The future network will support global roaming seamless and service provider portability. An identifier locator (ID/Loc) separation solution can achieve such a goal. Nevertheless, this ID/Loc separation scheme implies the need of adding a mapping system to store and maintain the binding between locators and identifiers. And this approach may introduce large signaling of the location update and the call ...


RACSMI: RL-based access control for identifier locator separation mapping based mobile internet

2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2015

With the demand for ubiquitous access to the Internet, significant number of users is adopting wireless approaches for accessing the Internet. This drives us to investigate secure access control issue for mobile client. In this paper, we propose a precise access control scheme for identifier locator separation mapping based mobile Internet in order to accurately control whether a mobile client ...


Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation

IEEE Transactions on Emerging Topics in Computing, 2016

In networks with identifier/locator separation, packets from a source to a destination are generally tunneled from the source's ingress tunnel router (ITR) to the destination's egress tunnel router (ETR). In addition, the source's ITR often caches the destination's identifier-to-locator mapping for a certain duration, called cache timeout, in order to avoid frequently querying mapping servers. When the destination moves from ...


More Xplore Articles

Educational Resources on Identifier Locator Separation

Back to Top

IEEE-USA E-Books

  • Identifier/locator separation: A worm detection and prevention perspective

    Identifier/locator separation is widely recognized as a promising solution to the routing scalability issue of the Internet routing architecture. Although it is believed that networks with identifier/locator separation are more secure than networks without identifier/locator separation, identifier/locator separation cannot evade the damage of worms either. In this paper, we argue that identifier/locator separation can help detect and prevent worms by analyzing and evaluating the worm detection probability and the number of infected machines. The results show that the worm detection in networks with identifier/locator separation is easier than in networks without identifier/locator separation and identifier/locator separation is more resistive to worm propagation. To the best of our knowledge, this is the first attempt on understanding the worm detection and prevention in networks with identifier/locator separation.

  • A fast handover management scheme for mobile identifier/locator separation networks

    Several researches propose the identifier/locator separation architecture to address the scaling problems of today's Internet routing and addressing system. And scalable and seamless mobility support is an important task in mobile identifier/locator separation networks. In this paper, by analyzing the features, such as direct separation, flexible mapping and identifier replacement, we show that the new architecture delivers data packets more efficiently and protects location privacy better than traditional mobile IP networks, and is convenient to implement soft handover. Then we present a fast handover management scheme for the new architecture, which improves the reactive handover mode of FMIPv6 and eliminates the duplicate address detection (DAD) and return routability (RR) processes in MIPv6. The numerical results show that the scheme has good scalability and low handover latency, and has great advantages in the signaling cost and fast mobility support.

  • A distributed mapping system to support mobility in identifier/locator separation architecture

    The future network will support global roaming seamless and service provider portability. An identifier locator (ID/Loc) separation solution can achieve such a goal. Nevertheless, this ID/Loc separation scheme implies the need of adding a mapping system to store and maintain the binding between locators and identifiers. And this approach may introduce large signaling of the location update and the call delivery into the mapping system. This paper proposed a scalable, robust and high-throughput mapping system. The proposed mapping system consists of a number of three-level tree subsystems, the top-level mapping servers of which constitute a Distributed Hash Table (DHT) ring. To evaluate the efficiency of the proposed distributed mapping system in terms of supporting mobility, we propose a location management mechanism, establish an analytical model, and formulate the location update and the call delivery cost. Numerical results demonstrate that the proposed mapping system can effectively reduce the burden of mapping systems as well as the signaling traffic and achieve greater scalability by supporting a high user density.

  • RACSMI: RL-based access control for identifier locator separation mapping based mobile internet

    With the demand for ubiquitous access to the Internet, significant number of users is adopting wireless approaches for accessing the Internet. This drives us to investigate secure access control issue for mobile client. In this paper, we propose a precise access control scheme for identifier locator separation mapping based mobile Internet in order to accurately control whether a mobile client is entitled to access contents from a specified server. Particularly, we propose a concrete design for identifier locator separation mapping based mobile Internet considering GPRS access. And based on this a reputation level based graded mapping system considering the reputation for both users and servers is proposed. We implement our design in an experimental platform and evaluate the scheme with respect to access control effectiveness, round-trip time and throughput. We further compare our scheme with the mobile internet currently used and identifier locator separation mapping based mobile Internet without graded mapping enabled to highlight the effectiveness of our design. Numerical results demonstrate that our design can achieve precious access control effectively with an acceptable degrade in RTT and throughput.

  • Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation

    In networks with identifier/locator separation, packets from a source to a destination are generally tunneled from the source's ingress tunnel router (ITR) to the destination's egress tunnel router (ETR). In addition, the source's ITR often caches the destination's identifier-to-locator mapping for a certain duration, called cache timeout, in order to avoid frequently querying mapping servers. When the destination moves from an old ETR to a new one, its identifier-to-locator mapping changes accordingly, which makes the destination's identifier-to-locator mapping cached at some ITRs outdated. While several approaches have been proposed to address this issue, they either cannot deal with all types of outdated mappings cached at the ITRs or face the triangular routing problem. Accordingly, in this paper, we propose a timer- based pointer forwarding (TBPF) approach that can deal with all types of outdated mappings and avoid the triangular routing problem. We present numerical results to compare TBPF with existing approaches and show that TBPF is a very promising solution for dealing with outdated mappings.

  • The multicast service model for Next Generation Internet based on Identifier/Locator Separation

    The traditional multicast service is based on the host group model, which transmits the packets to a set of receivers with a single destination address. In this model, anyone can send or receive the multicast packets once it joins the multicast group. As a result, the multicast service is difficult to deploy due to the lack of effective authentication and accounting mechanisms. The recent development of the new Internet architecture based on the Identifier/Locator Separation mechanisms brings a promising opportunity to improve the multicast service model. In this paper, we propose a Multicast service model based on Identifier/Locator Separation (MILS) mechanism. This model introduces Multicast Service Identifier (MSI) and Multicast Group Identifier (MGI) to identify the multicast membership and the multicast delivery. Besides, it utilizes Multicast Controller (MC) to maintain the mapping between MSI and MGI to provide the authentication and accounting functions, so as to satisfy the different requirements of multicast services. We evaluate its performance by simulations, and analyze its scalability in terms of the group number and session density. The results show that the MILS can reduce the multicast states and improve the performance of multicast services.

  • BILM: A novel BGP-based identifier-to-locator mapping approach

    The poor scalability is one of the most serious problems restricting the development of the Internet. In the series of solutions, identifier/locator separation technology is a great prospect and has been the mainstream of designs. However, how to design a system to distribute and update identifier- to-locator mapping information effectively in scope of the whole Internet is also a key issue not solved perfectly. In this article, we propose a novel identifier-to-locator mapping approach (called as BILM) by extending the border gateway protocol (BGP). Comparing with current schemes, BILM is déployable and operable. We also implement BILM in ns2 and the results of our simulation show that: BILM has good convergence and can make the identifier- to-locator mapping information synchronized quickly.

  • Preventing DDoS attacks by identifier/locator separation

    Identifier/locator separation is a promising solution to the current Internet scaling problems. In this article, we argue that identifier/location separation can also help prevent distributed denial-of-service (DDoS) attacks. We discuss an identifier-to-locator mapping approach and explain how the approach makes it difficult for attackers to control botnets. We also present numerical results based on data from a real DDoS attack to demonstrate that, even if many zombies attack a victim, identifier/locator separation helps detect DDoS attacks.

  • Routing in the Centralized Identifier Network

    We propose a clean-slate network architecture called Centralized Identifier Network (CIN) which jointly considers the ideas of both control plane/forwarding plane separation and identifier/locator separation. In such an architecture, a controller cluster is designed to perform routers' link states gathering and routing calculation/handing out. Meanwhile, a tailor-made router without routing calculation function is designed to forward packets and communicate with its controller. Furthermore, A router or a host owns a globally unique ID and a host should be registered to a router whose ID will be the host's location. Control plane/forwarding plane separation enables CIN easily re-splitting the network functions into finer optional building blocks for sufficient flexibility and adaptability. Identifier/locator separation helps CIN deal with serious scaling problems and offer support for host mobility. This article mainly shows the routing mechanism of CIN. Furthermore, numerical results are presented to demonstrate the performance of the proposed mechanism.

  • Domain-based identifier-locator mapping management for distributed mobility control

    Mobility management is one of the crucial requirements for IP-based future mobile networks. Some works have recently been made on identifier-locator mapping management for mobility control with the identifier-locator separation principle. However, the existing management schemes are still subject to scalability problem and performance degradation. In this paper, we propose a domain-based identifier-locator mapping management for distributed mobility control, in which a identifier of mobile node represents the domain that a mobile node belongs to, and the mapping information of identifiers and locators will be managed in the distributed way at each domain gateway by using the domain information contained in the identifier. From the numerical analysis, we can see that the proposed domain-based mapping management scheme can provide better performance than the existing centralized and hash-based mapping management schemes in terms of total delays including registration delay and data delivery delays.



Standards related to Identifier Locator Separation

Back to Top

No standards are currently tagged "Identifier Locator Separation"


Jobs related to Identifier Locator Separation

Back to Top