An End-to-EndApproach to Host Mobility
A Moving Target
Previous Approaches to Mobility
The Migrate Approach
Migrate Architecture
Previous Migration Schemes
Our Migration Approach
An Application: TCP
PPT Slide
TCP StateMachineChanges
Experimental Topology
Migration Trace
A Lossy Trace with SACK
Securing the Migration
Preventing DoS Attacks
Benefits & Limitations
Implementation Details
Continuing Research
Performance Implications
Limitations
Migrate Options
A Note on Key Strength
Email: snoeren@lcs.mit.edu
Home Page: http://nms.lcs.mit.edu
Download presentation source