2019
DOI: 10.17487/rfc8653
|View full text |Cite
|
Sign up to set email alerts
|

On-Demand Mobility Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…To address the above problem, one could think of a new privacy service that works as follows: (i) for those users that want to preserve their privacy, and contract the corresponding service, a fixed gateway could be used, and (ii) for the other users, we could simply use the best gateway from a traffic engineering perspective. Note that this approach is in line with the recent developments at the IETF, where solutions are being discussed to allow taking into consideration application/user needs when selecting the right anchor/IP address [13]. Such a solution has a number of advantages: (i) it preserves privacy of those users that require it, (ii) it has a low cost for the operator in terms of traffic engineering, as efficient routes are used for most traffic, and (iii) it provides the means to the operator to receive a revenue from those users willing to contract this service.…”
Section: B Location Privacymentioning
confidence: 73%
See 1 more Smart Citation
“…To address the above problem, one could think of a new privacy service that works as follows: (i) for those users that want to preserve their privacy, and contract the corresponding service, a fixed gateway could be used, and (ii) for the other users, we could simply use the best gateway from a traffic engineering perspective. Note that this approach is in line with the recent developments at the IETF, where solutions are being discussed to allow taking into consideration application/user needs when selecting the right anchor/IP address [13]. Such a solution has a number of advantages: (i) it preserves privacy of those users that require it, (ii) it has a low cost for the operator in terms of traffic engineering, as efficient routes are used for most traffic, and (iii) it provides the means to the operator to receive a revenue from those users willing to contract this service.…”
Section: B Location Privacymentioning
confidence: 73%
“…We then use Linux trafficcontrol 12 to provide QoS capabilities to the switches. 13 The connection between Open vSwitch and the SDN controller is performed out-of-band through standard OFP mechanisms. To evaluate the performance of our implementation, we configured the network topology shown in Fig.…”
Section: B Experimental Validationmentioning
confidence: 99%
“…FDMM has not yet been designated as a standard. An extension of the DMM [14] provided the service only when necessary because session continuity or IP address reachability was not required for all movements. This concept can be used in tactical networks, but it is out of the scope of this study.…”
Section: Standard Mobility Management Methodsmentioning
confidence: 99%
“…DMM can mean dynamic anchor selection for a particular MN [24]. However, On-Demand Mobility Management pertains to having session continuity requirements [25].…”
Section: Overview Of Software-defined Network and Corresponding Mobil...mentioning
confidence: 99%