طرح مدیریت تحرک مبتنی بر شبکه برای آینده اینترنت
|کد مقاله||سال انتشار||تعداد صفحات مقاله انگلیسی||ترجمه فارسی|
|28278||2010||12 صفحه PDF||سفارش دهید|
نسخه انگلیسی مقاله همین الان قابل دانلود است.
هزینه ترجمه مقاله بر اساس تعداد کلمات مقاله انگلیسی محاسبه می شود.
این مقاله تقریباً شامل 5642 کلمه می باشد.
هزینه ترجمه مقاله توسط مترجمان با تجربه، طبق جدول زیر محاسبه می شود:
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Computers & Electrical Engineering, Volume 36, Issue 2, March 2010, Pages 291–302
The current Internet was originally designed for “fixed” terminals and can hardly support mobility. It is necessary to develop new mobility management schemes for the future Internet. This paper proposes an Identifiers Separating and Mapping Scheme (ISMS), which is a candidate for the future Internet mobility management, and discusses the basic principles and detailed message flow. ISMS is a network-based mobility management scheme that takes advantage of the identity and location separation. The mobility entities in the core network are responsible for the location management. ISMS is designed to satisfy the requirements of faster handover, route optimism, advanced management, location privacy and security. The average handover delay of ISMS is on the order of milliseconds only, which is far smaller than that of Mobile IPv6. Analyses show that ISMS can reduce packet overhead on wireless channels. We build a prototype and perform some experiments. Results verify the feasibility of ISMS.
With the boom of wireless technology in all its forms, wireless has becoming one of the most transforming network technologies to come along. The most obvious consequence of wireless is mobility. However, the current Internet was originally designed for end-to-end communications between fixed terminals and cannot support mobility well. In order to support mobility, Internet Engineering Task Force (IETF) has proposed plenty of protocols such as Mobile IPv4 (MIPv4), and Mobile IPv6 (MIPv6). MIPv6  is the de facto standard for IP mobility in IPv6 networks. It is a host based mobility scheme. That is, in MIPv6, a mobile node (MN) must support MIPv6 protocol and be involved in the mobility management procedures. For example, an MN must acquire a globally unique care-of address (CoA) whenever it moves to a foreign network. The MN also participates in the location management by sending binding updates to its home agent (HA) and corresponding nodes (CN). The host based MIPv6 protocol has several drawbacks such as slow handoff , triangle routing, disclosure of location privacy , disclosure of mobility management node’s address, i.e., HA, to MN and 3rd parties, and packet overhead on wire/wireless links between MN and HA. In this paper, we present an Identifiers Separating and Mapping Scheme (ISMS) to solve these problems. ISMS separates customer networks from transit providers, and decomposes Internet addresses into Accessing Identifiers (AIDs) and Switching-Routing Identifiers (SRIDs) to decouple the “locator/identifier overload” of IP address. AIDs are network layer identifiers to be used by transport layer. On the other hand, SRIDs serve as routing tags in the core network. For flexibility, AID to SRID mapping is used to bridge the customer networks and the core network. As a result, we obtain a network-based mobility management scheme which provides lower handoff latency and highly efficient mobility management. The rest of this paper is organized as follows. Section 2 describes the related work. Section 3 describes the ISMS architecture and its working schemes. Section 4 analyzes the performance of ISMS, and compares it with MIPv6 and PMIPv6. Section 5 shows our prototype and the experimental results. Finally, Section 6 concludes this paper.
نتیجه گیری انگلیسی
This paper proposes an Identifiers Separating and Mapping Scheme which is a mobility management scheme for the future Internet. ISMS is a network-based scheme which provides lower handoff latency and efficient management. In addition, ISMS’s separating scheme raises a barrier against malicious attacks aimed at the provider infrastructure, and provides an effective means of protection against privacy disclosures. Analysis and experiments show that ISMS is feasible and effective.