Today's socket API requires an application to bind a socket to a transport-layer identifier (e.g., TCP80) and network-layer identifier (e.g., an IP address). These early bindings create significant bottlenecks, reliability issues, and force applications to manage complex lower-layer issues. Many approaches have been proposed to address these problems; however, all of them introduce additional identifiers, modify applications, or require additional protocols in the protocol stack. We introduce HIDRA (Hidden Identifiers for Demultiplexing and Resolution Architecture), an approach based on hidden identifiers used internally at end systems and intermediate systems. HIDRA enables sockets to evolve with the Internet by hiding all mobility, multih...
Research around the tenets of a next generation Internet architecture has resulted in numerous futur...
Increased host mobility, and multi-homing make IP address management very complex in applications. D...
Part 4: Access ControlInternational audienceCovert channels are a form of hidden communication that ...
Today's socket API requires an application to bind a socket to a transport-layer identifier (e.g., T...
The current Internet architecture requires applications to transparently bind and manage network add...
Today's socket API requires an application to bind a socket to a network address before it can use t...
The current internetworking architecture presents some limitations to naturally support mobility, se...
The goal of this thesis is to define a set of changes to the TCP/IP stack that allow connections bet...
Despite the vast set of prior work on identifier-locator split architectures, no one approach has se...
The current internetworking architecture presents some limitations to naturally support mobility, se...
Host identity protocol (HIP) has security support to enable secured mobility and multihoming, both o...
Host Identity Protocol (HIP) is a new layer between transport and network layers. HIP offers a new ...
The size of the Internet’s forwarding table is growing rapidly, generating concerns about the abilit...
IP address has become a key feature in the current internet architecture. However, the basic design ...
Internet users seek solutions for mobility, multi-homing, support for localised address management (...
Research around the tenets of a next generation Internet architecture has resulted in numerous futur...
Increased host mobility, and multi-homing make IP address management very complex in applications. D...
Part 4: Access ControlInternational audienceCovert channels are a form of hidden communication that ...
Today's socket API requires an application to bind a socket to a transport-layer identifier (e.g., T...
The current Internet architecture requires applications to transparently bind and manage network add...
Today's socket API requires an application to bind a socket to a network address before it can use t...
The current internetworking architecture presents some limitations to naturally support mobility, se...
The goal of this thesis is to define a set of changes to the TCP/IP stack that allow connections bet...
Despite the vast set of prior work on identifier-locator split architectures, no one approach has se...
The current internetworking architecture presents some limitations to naturally support mobility, se...
Host identity protocol (HIP) has security support to enable secured mobility and multihoming, both o...
Host Identity Protocol (HIP) is a new layer between transport and network layers. HIP offers a new ...
The size of the Internet’s forwarding table is growing rapidly, generating concerns about the abilit...
IP address has become a key feature in the current internet architecture. However, the basic design ...
Internet users seek solutions for mobility, multi-homing, support for localised address management (...
Research around the tenets of a next generation Internet architecture has resulted in numerous futur...
Increased host mobility, and multi-homing make IP address management very complex in applications. D...
Part 4: Access ControlInternational audienceCovert channels are a form of hidden communication that ...