Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Locator/identifier split using the data link layer  [PDF]
Victor Grishchenko
Computer Science , 2008,
Abstract: The locator/identifier split approach assumes separating functions of a locator (i.e. topology--dependent attachment point address) and identifier (topology-independent unique identifier) currently both served by an IP address. This work is an attempt to redefine semantics of MAC address to make it a pure layer-2 locator instead of a pure globally-unique identifier. Such an exercise might be interesting from the standpoint of Ethernet scaling and Metro Ethernet technologies. From the global routing perspective, introduction of multihoming, traffic engineering and failover at the 2nd layer may reduce pressure on the 3rd layer.
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split  [PDF]
Rui TU, Jinshu SU, Ruoshan KONG
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.27072
Abstract: Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.
Optimization of access control list based on locator/identifier split

YAO Yu-feng,TU Rui,

计算机应用研究 , 2010,
Abstract: With the support of locator and identifier separation architecture (LISA),this paper proposed IBAC model which made network access control more accurate and efficient. However, IBAC increased the process costs of ACL(access control list).In order to reduce the process costs,this paper analyzed and optimized the rules structure of ACL.The simulation test results prove the efficiency of the optimization approach.
Site Multihoming Path Failure Recovery Mechanism Based on Locator/Identifier Split

TU Rui,SU Jin-shu,CHEN Feng,

计算机科学 , 2009,
Abstract: The multihoming is one of the effective ways to defeat path failure and increase the reliability of site network service.However,limited by the TCP/IP naming and addressing architecture,the mulithoming has not been well deployed.One of the most important reasons is the problem of semantic overloading of IP address.Current IP address has dual semantic functions,which indicates both the network node's routing locator and its endpoint identifier.We proposed a sit mulithoming path failure recovery mechanism(LIS...
Key Techniques of Identifier-Based Routing

HOU Jie,LIU Ya-Ping,GONG Zheng-Hu,
侯 婕

软件学报 , 2010,
Abstract: With the rapid development of Internet technology, the existing routing system has been confronting many serious challenges of scalability, mobility, multi-homing and traffic engineering. Based on the idea of Identifier/Locator Split, the concept of identifier-based routing is proposed, and its research scope is accurately defined in this paper. On the basis of the design goals of identifier-based routing, some related researches are introduced and compared. Finally, some key issues and the development trends are discussed.
LISP-HIMS:A Hierarchical Identifier Mapping System for LISP

XU Chang,REN Yong-mao,LI Jun,
徐 畅
,任勇毛,李 俊

计算机科学 , 2012,
Abstract: Aiming at the problem of currently rapid growth of global routing table size in DFZ, IETF has proposed to reconsider the Internet addressing architecture by splitting host identifier and its routing locator. LISP is considered to be one of the most promising solutions based on such idea,which was proposed by Cisco. I}his paper presented a novel mapping system for LISP proposal, elaborated the model and modes of this mapping system and also the allocation strategy of the hierarchical host identifier. Compared with other LISP-based mapping systems, the proposed mapping system has better scalability and lower mapping querying latency.
SIDMAP:A Service-oriented Mapping System for Loc/ID split Internet Naming  [cached]
Daochao Huang,Dong Yang,Fei Song,Hongke Zhang
Journal of Communications , 2011, DOI: 10.4304/jcm.6.8.601-609
Abstract: While locator/identifier split makes Internet routing more scalable, the promise of a mapping system that resolves a service to corresponding location is yet to be realized. Part of the challenge is due to most current approaches only focusing on how to find the location of a host, not the location of a service, which make these systems rely on extra naming system to provide applications the requested service's location and introduce complex load interactions between the locator/identifier mapping system and naming system. Another challenge is due to the vast majority of current Internet usage changed from host-centric applications to data retrieval and service access, traditional domain name system (DNS) is unable to support today's Internet needs such as service migration and composition. We introduce SIDMAP--a novel,efficient service-oriented naming scheme for incorporating service identifier/identifier mapping system that returns appropriate locators in response to mapping requests for specific service identifiers,service migration and service composition into one system. According to the result of evaluations, our mechanism has good scalability and low resolution latency.
A Network-based Secure Mobility Control Protocol in Locator/Identifier Separation Networks

Tang Jian-qiang Liu Ying Zhou Hua-chun Zhang Hong-ke,

电子与信息学报 , 2013,
Abstract: For the mobility issue in Locator/Identifier Separation Protocol (LISP) networks, a network-based Secure Mobility Control Protocol (LISP-SMCP) is proposed. Taking access networks as different mobile domains, LISP SMCP supports mobile nodes intra-domain handoff and inter-domain handoff efficiently, and achieves local authentication and mutual authentication. The security and performance analysis results show that, LISP-SMCP can resist man-in-the-middle attacks, replay attacks and modified attacks. And it outperforms existing schemes in terms of authentication latency, handoff latency and handoff blocking probability.
Does the POA-SOA split matter for global CCN formation?  [PDF]
W. Trivitayanurak,P. J. Adams
Atmospheric Chemistry and Physics Discussions , 2013, DOI: 10.5194/acpd-13-10561-2013
Abstract: A model of carbonaceous aerosols has been implemented into the TwO-Moment Aerosol Sectional (TOMAS) microphysics module in the GEOS-Chem CTM, a model driven by assimilated meteorology. Inclusion of carbonaceous emissions alongside pre-existing treatments of sulfate and sea-salt aerosols increases the number of emitted primary aerosol particles by a factor of 2.5 and raises annual-average global CCN(0.2%) concentrations by a factor of two. Compared to the prior model without carbonaceous aerosols, this development improves the model prediction of CN10 number concentrations significantly from 45 to 7% bias when compared to long-term observations. However, similar to other OC/EC models, the model underpredicts OC and EC mass concentrations by a factor of 2–5 when compared to EMEP observations. Because primary OA and secondary OA affect aerosol number size distributions differently, we assess the sensitivity of CCN production, for a fixed source of OA mass, to the assumed POA-SOA split in the model. For a fixed OA budget, we found that CCN(0.2%) decreases nearly everywhere as the model changes from a world dominated by POA emissions to one dominated by SOA condensation. POA is about twice as effective per unit mass at CCN production compared to SOA. Changing from a 100% POA scenario to a 100% SOA scenario, CCN(0.2%) concentrations in the lowest model layer decrease by about 20%. In any scenario, carbonaceous aerosols contribute significantly to global CCN. The SOA-POA split has a significant effect on global CCN and the microphysical implications of POA emissions versus SOA condensation appear to be at least as important as differences in chemical composition as expressed by the hygroscopicity of OA. These findings stress the need to better understand carbonaceous aerosols loadings, the global SOA budget, microphysical pathways of OA formation (emissions versus condensation) as well as chemical composition to improve climate modeling.
The LHCb Vertex Locator performance and Vertex Locator upgrade  [PDF]
Pablo Rodríguez Pérez,for the LHCb VELO Group,for the VELO Upgrade group
Physics , 2012, DOI: 10.1088/1748-0221/7/12/C12008
Abstract: LHCb is an experiment dedicated to the study of new physics in the decays of beauty and charm hadrons at the Large Hadron Collider (LHC) at CERN. The Vertex Locator (VELO) is the silicon detector surrounding the LHCb interaction point. The detector operates in a severe and highly non-uniform radiation environment. The small pitch and analogue readout result in a best single hit precision of 4 $\rm \mu$m. The upgrade of the LHCb experiment, planned for 2018, will transform the entire readout to a trigger-less system operating at 40 MHz event rate. The vertex detector will have to cope with radiation levels up to 10$^{16}$ 1 MeV$\rm n_{eq}/cm^2$, more than an order of magnitude higher than those expected at the current experiment. A solution is under development with a pixel detector, based on the Timepix/Medipix family of chips with 55 x 55 $\rm \mu m$ pixels. In addition a micro-strip solution is also under development, with finer pitch, higher granularity and lower mass than the current detector. The current status of the VELO will be described together with recent testbeam results.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.