SlideShare uma empresa Scribd logo
1 de 30
Authors: Ved P. Kafle & Masugi Inoue 
Presenter: SOK, Phearin 
MBC Lab. 
Konkuk University
• Introduction 
• HIMALIS Architecture 
• Verification of Architectural Functions 
• Conclusion
Many researches on Future Internet or Next Generation 
Network: 
 FIND and GENI – United States 
 AKARI – Japan 
 FIF – Korea 
 EIFFEL – Europe 
Researches focus on new designs of: 
 Routing/Addressing architectures 
 Mobility 
 Security
 IP address is used as: 
• Host Identifier (ID) – identify 
communication session in transport 
and upper layer protocol 
• Locator – locate the destination host 
and forward packets in network layer 
protocol 
 Host movement leads to session 
termination
• Heterogeneity Inclusion and Mobility Adaptation 
through Locator ID Separation (HIMALIS) 
architecture is proposed for a new naming scheme 
for generating host names and IDs by separating 
namespaces for host ID and locator. 
• Three binding registries: 
 Domain Name Registry 
 Host Name Registry 
 ID Registry 
resolve host names to IDs and locators 
initialization phase 
distribute host ID to locator binding updates in 
the network
• Host name: 
 Variable-length character sets 
• Host ID: 
 Fixed-length bit strings 
 Control information and packet headers to 
identify sessions or packets
• Global Hostname: 
Ex. mbc-pc-1009#mbclab.com 
• Host ID = concatenation(prefix, scope, version, 
hash function(global hostname, parameter)) 
– Prefix field: aggregate host 
– Version field: derivation of host ID by using different 
parameters of hash function – MD5 or SHA-1 
– Scope field: private, public, local or global
• Local Edge ( or Access) Network can be wireless 
sensor networks, ad-hoc networks… 
• Global Transit Network – a collection of service 
provider’s backbone networks, provides stable 
configuration and connection
• Unified Logical Control Network 
Unified Logical Network Unified Control Network 
Domain 
Name 
Registries 
ID 
Registries 
Maintains and distributes 
information of AAA, QoS, 
network configuration…
• Stores binding information between domain 
names and locators of Host Name Registries 
(HNR) of each Edge Network 
• Binding record 
does NOT change 
frequently 
• A hierarchical 
structure like the 
DNS
Stores and distributes bindings 
between IDs and locators of all 
active hosts by propagating to the 
correspondent gateways and hosts 
-Detects the binding update 
due to mobility 
-Uploads the update to IDR.
• Dynamically stores the bindings between host 
names and IDs, locators, and security keys of the 
hosts when hosts physically move to a new 
network or activate different interfaces. 
• Host registration 
– Hosts register their names, IDs, locators, … with HNR 
when first connecting 
– Hosts send registration update request to HNR when 
changing their IDs, locators, …
• Relates: 
Host ID used in the transport and upper layers 
Locators used in the network layer 
• Hides the protocol or locator changes from transport 
layer to application layer. 
Ex. IPv4 to IPv6 changes in Network layer protocol
Communication Types: 
 Light-weight Communication 
MN and CN start their data communicate directly 
 Secure Communication 
MN and CN start data communication after exchanging 
control messages
carries out ID/locator 
mapping functions: 
-create and append an identity 
header to the packet 
-send the packet to an 
appropriate network layer 
protocol 
maintains session states such 
as host IDs, locators, security 
keys, hash functions, …
- resolve global 
host names into 
host IDs/locators 
- Initiate 
communication 
with peer hosts 
- manage mobility 
and multihoming 
- monitors status 
of network 
interfaces (i.e., 
locators) 
- signals the State 
Manager to 
update the 
currently active 
locators or 
protocols
The header is used in both signaling and data 
packets.
• IDR 
• Gateway 
• HNR 
implemented in the same node 
implemented in the separated node 
• Linux PCs – support L2 handover for the device 
driver of linux 
• Time in use 
• Host 1 : 8ms for configuration 
• IDR : 4ms for locator request and response
• For efficiency in future dynamic network, HIMALIS 
architecture provides 
– A new naming system 
– Two-layered resolution system 
• HIMALIS can be a common platform to provide: 
– Mobility management 
– Resource discovery 
Future work: network management and control.
THANK YOU

Mais conteúdo relacionado

Mais procurados (20)

MVA slides lesson 6
MVA slides lesson 6MVA slides lesson 6
MVA slides lesson 6
 
Msit computer networks 1
Msit computer networks 1Msit computer networks 1
Msit computer networks 1
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Osi
OsiOsi
Osi
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Najeeb resume sjsu
Najeeb resume sjsuNajeeb resume sjsu
Najeeb resume sjsu
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Internetworking
InternetworkingInternetworking
Internetworking
 
IoT RF Protocols
IoT RF ProtocolsIoT RF Protocols
IoT RF Protocols
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
 

Destaque

Lync Mobility Architecture
Lync Mobility ArchitectureLync Mobility Architecture
Lync Mobility ArchitectureMUCUGL
 
Lync 2013 Mobility Architecture
Lync 2013 Mobility ArchitectureLync 2013 Mobility Architecture
Lync 2013 Mobility ArchitectureMUCUGL
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture StrategyGary Wong
 
architecture of mobile software applications
architecture of mobile software applicationsarchitecture of mobile software applications
architecture of mobile software applicationsHassan Dar
 

Destaque (8)

Lync Mobility Architecture
Lync Mobility ArchitectureLync Mobility Architecture
Lync Mobility Architecture
 
Lync 2013 Mobility Architecture
Lync 2013 Mobility ArchitectureLync 2013 Mobility Architecture
Lync 2013 Mobility Architecture
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
 
architecture of mobile software applications
architecture of mobile software applicationsarchitecture of mobile software applications
architecture of mobile software applications
 

Semelhante a Mobility Management in HIMALIS Architecture

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111abenimelos
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111abenimelos
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
Mobility managment and io t standards
Mobility managment and io t standardsMobility managment and io t standards
Mobility managment and io t standardswaelayoub
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
section1.1.pptx
section1.1.pptxsection1.1.pptx
section1.1.pptxmani651780
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworkingshahin raj
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
presentation on Internet and its protocol
presentation on Internet and its protocolpresentation on Internet and its protocol
presentation on Internet and its protocolitsaartihere001
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptxFidaBaloch8
 

Semelhante a Mobility Management in HIMALIS Architecture (20)

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Mobility managment and io t standards
Mobility managment and io t standardsMobility managment and io t standards
Mobility managment and io t standards
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
section1.1.pptx
section1.1.pptxsection1.1.pptx
section1.1.pptx
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworking
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
presentation on Internet and its protocol
presentation on Internet and its protocolpresentation on Internet and its protocol
presentation on Internet and its protocol
 
data communication
data communicationdata communication
data communication
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptx
 

Mais de Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityPhearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDPhearin Sok
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 

Mais de Phearin Sok (10)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 

Último

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Mobility Management in HIMALIS Architecture

  • 1. Authors: Ved P. Kafle & Masugi Inoue Presenter: SOK, Phearin MBC Lab. Konkuk University
  • 2. • Introduction • HIMALIS Architecture • Verification of Architectural Functions • Conclusion
  • 3.
  • 4. Many researches on Future Internet or Next Generation Network:  FIND and GENI – United States  AKARI – Japan  FIF – Korea  EIFFEL – Europe Researches focus on new designs of:  Routing/Addressing architectures  Mobility  Security
  • 5.
  • 6.  IP address is used as: • Host Identifier (ID) – identify communication session in transport and upper layer protocol • Locator – locate the destination host and forward packets in network layer protocol  Host movement leads to session termination
  • 7. • Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) architecture is proposed for a new naming scheme for generating host names and IDs by separating namespaces for host ID and locator. • Three binding registries:  Domain Name Registry  Host Name Registry  ID Registry resolve host names to IDs and locators initialization phase distribute host ID to locator binding updates in the network
  • 8.
  • 9. • Host name:  Variable-length character sets • Host ID:  Fixed-length bit strings  Control information and packet headers to identify sessions or packets
  • 10.
  • 11. • Global Hostname: Ex. mbc-pc-1009#mbclab.com • Host ID = concatenation(prefix, scope, version, hash function(global hostname, parameter)) – Prefix field: aggregate host – Version field: derivation of host ID by using different parameters of hash function – MD5 or SHA-1 – Scope field: private, public, local or global
  • 12.
  • 13. • Local Edge ( or Access) Network can be wireless sensor networks, ad-hoc networks… • Global Transit Network – a collection of service provider’s backbone networks, provides stable configuration and connection
  • 14. • Unified Logical Control Network Unified Logical Network Unified Control Network Domain Name Registries ID Registries Maintains and distributes information of AAA, QoS, network configuration…
  • 15.
  • 16. • Stores binding information between domain names and locators of Host Name Registries (HNR) of each Edge Network • Binding record does NOT change frequently • A hierarchical structure like the DNS
  • 17. Stores and distributes bindings between IDs and locators of all active hosts by propagating to the correspondent gateways and hosts -Detects the binding update due to mobility -Uploads the update to IDR.
  • 18. • Dynamically stores the bindings between host names and IDs, locators, and security keys of the hosts when hosts physically move to a new network or activate different interfaces. • Host registration – Hosts register their names, IDs, locators, … with HNR when first connecting – Hosts send registration update request to HNR when changing their IDs, locators, …
  • 19. • Relates: Host ID used in the transport and upper layers Locators used in the network layer • Hides the protocol or locator changes from transport layer to application layer. Ex. IPv4 to IPv6 changes in Network layer protocol
  • 20.
  • 21. Communication Types:  Light-weight Communication MN and CN start their data communicate directly  Secure Communication MN and CN start data communication after exchanging control messages
  • 22.
  • 23. carries out ID/locator mapping functions: -create and append an identity header to the packet -send the packet to an appropriate network layer protocol maintains session states such as host IDs, locators, security keys, hash functions, …
  • 24. - resolve global host names into host IDs/locators - Initiate communication with peer hosts - manage mobility and multihoming - monitors status of network interfaces (i.e., locators) - signals the State Manager to update the currently active locators or protocols
  • 25. The header is used in both signaling and data packets.
  • 26.
  • 27. • IDR • Gateway • HNR implemented in the same node implemented in the separated node • Linux PCs – support L2 handover for the device driver of linux • Time in use • Host 1 : 8ms for configuration • IDR : 4ms for locator request and response
  • 28.
  • 29. • For efficiency in future dynamic network, HIMALIS architecture provides – A new naming system – Two-layered resolution system • HIMALIS can be a common platform to provide: – Mobility management – Resource discovery Future work: network management and control.