An End-to-End Approach to Host Mobility


Click here to start

Table of Contents

An End-to-End Approach to Host Mobility

A Moving Target

Previous Approaches to Mobility

The Migrate Approach

Migrate Architecture

Previous Migration Schemes

Our Migration Approach

An Application: TCP

PPT Slide

PPT Slide

PPT Slide

TCP State Machine Changes

Experimental Topology

Migration Trace

A Lossy Trace with SACK

Securing the Migration

Preventing DoS Attacks

Benefits & Limitations

PPT Slide

Implementation Details

Continuing Research

Performance Implications


Migrate Options

A Note on Key Strength

Author: Alex C. Snoeren


Home Page:

Download presentation source